Preview Tool

Cisco Bug: CSCus62707 - Cisco PCA Default Account Credential Vulnerability

Last Modified

Aug 06, 2018

Products (2)

  • Cisco Prime Collaboration
  • Cisco Prime Collaboration 10.6

Known Affected Releases

10.5(1) 10.6

Description (partial)

A vulnerability in Cisco Prime Collaboration Assurance (PCA) Software could allow an unauthenticated, remote attacker to log in to the system
shell with the default cmuser user account and access the shell with a limited set of permissions.

    The vulnerability occurs because an undocumented account has a default and static password. This account is created at installation and
cannot be changed or deleted without impacting the functionality of the system. The first time this account is used, the system will request that
the user change the default password.

    An attacker could exploit this vulnerability by remotely connecting to the affected system via SSH using the undocumented account. Successful
exploitation could allow the attacker to access the system with the privileges of the cmuser user. This vulnerability allows the attacker to
access some sensitive information such as the password file, system logs, and Cisco PCA database information; modify some data; run some internal
executables; and possibly cause system instability or make the system inaccessible.

    Cisco has released software updates that address this vulnerability. Workarounds are available.

    This advisory is available at the following link:

See Cisco Security Advisory
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.