Multiple Linux vulnerabilities found in Cisco videoconferencing systems


Multiple Linux vulnerabilities found in Cisco videoconferencing systems

Ron Condon

A security researcher has discovered critical flaws affecting the Linux-based operating system in Cisco Systems Inc.'s Unified Videoconferencing systems. The flaws could enable an attacker to gain access to the device to steal credentials.

The flaws affect Cisco UVC 5100 series, 5200 and 3500 Series. Cisco currently has no fixes for the vulnerabilities and recommends "limiting access to Cisco UVC web server to trusted hosts by disabling FTP, SSH, and Telnet services and by setting the Security mode field in the Security section of the Cisco UVC web GUI to Maximum."

The vulnerabilities were first reported to Cisco by Florent Daigniere, a researcher with Matta Ld, a penetration testing company based in Richmond, Surrey. He found seven distinct vulnerabilities in the Cisco products, including hard-coded usernames, weak session IDs and weak obfuscation of credentials.

In a posting at the Full Disclosure Mailing list, Daigniere said the Cisco vulnerabilities would allow an attacker to "get full control of the device and harvest user passwords with little to no effort." The attacker could also launch an attack against other parts of the target infrastructure.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy