Multiple Linux vulnerabilities found in Cisco videoconferencing systems

Multiple vulnerabilities in Cisco's video conferencing systems remain exploitable, enabling attackers to gain full control of the device to steal user passwords with little effort.

A security researcher has discovered critical flaws affecting the Linux-based operating system in Cisco Systems Inc.'s Unified Videoconferencing systems. The flaws could enable an attacker to gain access to the device to steal credentials.

The flaws affect Cisco UVC 5100 series, 5200 and 3500 Series. Cisco currently has no fixes for the vulnerabilities and recommends "limiting access to Cisco UVC web server to trusted hosts by disabling FTP, SSH, and Telnet services and by setting the Security mode field in the Security section of the Cisco UVC web GUI to Maximum."

The vulnerabilities were first reported to Cisco by Florent Daigniere, a researcher with Matta Ld, a penetration testing company based in Richmond, Surrey. He found seven distinct vulnerabilities in the Cisco products, including hard-coded usernames, weak session IDs and weak obfuscation of credentials.

In a posting at the Full Disclosure Mailing list, Daigniere said the Cisco vulnerabilities would allow an attacker to "get full control of the device and harvest user passwords with little to no effort." The attacker could also launch an attack against other parts of the target infrastructure.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Identity and access management products



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: