A security researcher has discovered critical flaws affecting the Linux-based operating system in Cisco Systems Inc.'s Unified Videoconferencing systems. The flaws could enable an attacker to gain access to the device to steal credentials.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The flaws affect Cisco UVC 5100 series, 5200 and 3500 Series. Cisco currently has no fixes for the vulnerabilities and recommends "limiting access to Cisco UVC web server to trusted hosts by disabling FTP, SSH, and Telnet services and by setting the Security mode field in the Security section of the Cisco UVC web GUI to Maximum."
The vulnerabilities were first reported to Cisco by Florent Daigniere, a researcher with Matta Ld, a penetration testing company based in Richmond, Surrey. He found seven distinct vulnerabilities in the Cisco products, including hard-coded usernames, weak session IDs and weak obfuscation of credentials.
In a posting at the Full Disclosure Mailing list, Daigniere said the Cisco vulnerabilities would allow an attacker to "get full control of the device and harvest user passwords with little to no effort." The attacker could also launch an attack against other parts of the target infrastructure.