Cisco Prime Network Registrar Privilege Escalation Vulnerability

Cisco-SA-20150917-CVE-2015-6296 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the default configuration of the Cisco Prime Network Registrar (CPNR) virtual appliance (OVA) which could allow an authenticated, local attacker to gain root privileges. The vulnerability is due to an insecure default account present on the affected device. A local attacker could exploit the vulnerability by using the insecure default account to gain additional privileges on the affected device. If successful, the attacker could gain root privileges and possibly compromise the affected device. Cisco has confirmed the vulnerability; however, software updates are not available.  To exploit this vulnerability, an attacker must authenticate to the targeted device with local account access. This access requirement reduces the likelihood of a successful exploit. Cisco  indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-6296
Cisco Bug IDsNA
CVSS ScoreBase 6.8
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C

Products with public affected evidence