Remote Code Execution Vulnerability in Cisco Elastic Services Controller Software
CVE-2018-0130

9.8CRITICAL

Key Information:

Vendor
Cisco
Vendor
CVE Published:
22 February 2018

Summary

A security flaw in Cisco Elastic Services Controller Software permits remote, unauthenticated attackers to bypass authentication and gain administrative access to the web-based service portal. This vulnerability arises from the use of static default credentials, which can be exploited if an attacker retrieves these credentials from an image of the affected software. Once obtained, the attacker can craft a valid session token to access other installations of the software, leading to potentially severe security breaches.

Affected Version(s)

Cisco Elastic Services Controller Cisco Elastic Services Controller

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.