Menu
Cisco leaves key to all its Unified CDM systems under doormat

Cisco leaves key to all its Unified CDM systems under doormat

Cisco's Unified Communications Domain Manager software contains a privileged account with a static password that can't be deleted or changed

Cisco Systems recently realized that its Unified Communications Domain Manager (Unified CDM) software contains a default privileged account with a static password that cannot be changed, exposing the platform to hacking by remote attackers.

The Cisco Unified CDM is part of the Cisco Hosted Collaboration System and provides automation and administrative functions for the Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Jabber applications, associated phones and software clients.

The privileged account is created when Unified CDM is first installed and cannot be changed or removed without affecting the system's functionality -- although exactly how, Cisco didn't say in its security advisory. The only solution, the company said, is to install the patches it released.

If the flaw is left unfixed, remote attackers could potentially access the platform via SSH and log in with this default account, which has root privileges. This would provide them with full control over the affected system.

Cisco assigned the highest possible severity score -- 10 -- to the vulnerability based on the Common Vulnerability Scoring System (CVSS). This means that exploiting the flaw is easy and can lead to a complete compromise of the system's confidentiality, integrity and availability.

The vulnerability was fixed in the Unified CDM software version 4.4.5, but hotfixes are also available for versions 4.4.3 and 4.4.4 for customers with support contracts.

The issue was discovered by Cisco during internal security tests and the company is not aware of the flaw being exploited in the wild.

Default administrative accounts with hard-coded static passwords are a serious issue, but they're not a new occurrence in networking and other hardware appliances. They are the result of poor design decisions back in a time when security did not play an important role in product development.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesintrusionCisco SystemssecurityAccess control and authenticationExploits / vulnerabilities

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments