Cisco UCS Director Default Credentials (Web UI)

high Nessus Plugin ID 78769

Synopsis

The remote web application uses default credentials.

Description

It is possible to log into the remote Cisco UCS Director installation by providing the default credentials. A remote, unauthenticated attacker can exploit this to gain administrative control.

Solution

Secure any default accounts with a strong password.

Plugin Details

Severity: High

ID: 78769

File Name: cisco_ucs_director_default_creds_webui.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 10/31/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:cisco:ucs_director

Required KB Items: Host/Cisco/UCSDirector/WebUIVersion

Excluded KB Items: global_settings/supplied_logins_only