Short Name |
APP:CISCO:REGISTRAR-AUTH-BYPASS |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Cisco Network Registrar Default Credentials Authentication Bypass |
Release Date |
2011/06/20 |
Update Number |
1942 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known authentication bypass vulnerability in Cisco Network Registrar. It is due to use of default admin privileges. A successful attack can result in compromise of an admin account.
Cisco CNS Network Registrar is prone to a remote authentication-bypass vulnerability. An attacker can exploit this issue to gain unauthorized administrative access to the affected device. Successful exploits will result in the complete compromise of the affected device. This issue is being tracked by Cisco bug ID CSCsm50627.