Executive Summary

Title Cisco Prime Data Center Network Manager Server Static Credential Vulnerability
Name cisco-sa-20170607-dcnm2 First vendor Publication 2017-06-07
Vendor Cisco Last vendor Modification 2017-06-07
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges.

The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2"]


iQKBBAEBAgBrBQJZOCSaZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHmm6BAAnuxcp3Xqhv70Zbi2 RbGbIIzfdgRkQQMSL8trbIALu4B1BoOUBZDVXyAfjqqISeT8zNmb8cNFkP1CLuQI OIa22LS6hvxeqYHB4euGx1K3sqDF3a6/OGAbR/a9KoWPDMiNpUrqmG84l4eAwt2E aJ9/FY1pjc4NfUKQMUliPCytJnoYXFw2f2opqG1sr3lVGyxHfXdsr23wbTukyVRB C4j56FmJhDlhg7ATby9cswgSgwLQR7qQMHDZUj6wb5GDk+ZEsXFbPUA6TYhlRM/9 HAL4QAkxvAD+M2VSaI3r3aS15oM2qr66fCobC/bvOT4DoPoOGRc9C1KkEVIxHRn/ 7GtoDt77oufNnWPC7eJh0a1vQGwSSqN3sO3sjWAZAdC62oMQR8tmE2paRXxmOIDb TCjupRG9KxKO22Wmetr4KcxLqxWQXrpKaxZJV51LxoJhkO9ROu7PKHXZP90FurwN F1wn/BpmRlsGxnyJ7joSNv2qTD/eEz8eb4cnvvjsDFLaizCJSo+2rMYBoRpZ8cvK I/D/5B0DKxSM8N8shJ65WGgTT/Uf1ZVzaSp5r+eP8bjRiaOOQIkSqjzwavkmh9gA n0im18EBJxe7Z1RIoFvXZ52ke8aR+W43fRo3VShZaZAqIB53cDzI/e7cG3yI37jG wAgGGE7zpg7fa5vkCiXyr4laEuE= =SYsN END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-770 Allocation of Resources Without Limits or Throttling

CPE : Common Platform Enumeration

Application 3

Snort® IPS/IDS

Date Description
2017-06-08 JBoss Management console access detected
RuleID : 43135 - Revision : 1 - Type : POLICY-OTHER

Nessus® Vulnerability Scanner

Date Description
2017-07-10 Name : A network management system running on the remote host is affected by an auth...
File : cisco_dcnm_cve-2017-6640.nasl - Type : ACT_ATTACK
2017-06-22 Name : A network management system running on the remote host is affected by multipl...
File : cisco-sa-20170607-dcnm.nasl - Type : ACT_GATHER_INFO
2017-06-16 Name : A network management system installed on the remote host is affected by multi...
File : cisco_prime_dcnm_10_2_1_local.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-07-11 13:24:30
  • Multiple Updates
2017-06-23 13:23:48
  • Multiple Updates
2017-06-17 13:23:43
  • Multiple Updates
2017-06-15 21:24:42
  • Multiple Updates
2017-06-08 17:24:56
  • Multiple Updates
2017-06-07 21:22:00
  • First insertion