Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Cisco NX-OS Vendors:   Cisco
Cisco Nexus 3000 Series Default Account and Credentials Lets Remote Users Access the Target System with Root Privileges
SecurityTracker Alert ID:  1035161
SecurityTracker URL:
CVE Reference:   CVE-2016-1329   (Links to External Site)
Date:  Mar 2 2016
Impact:   Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco NX-OS on Nexus 3000 Series devices. A remote user can gain access to the target system.

A remote user can use a default user account with a static password to login via Telnet or SSH to the target device and access a bash shell with 'root' privileges.

The default user account is created during installation and cannot be changed or deleted.

Versions 6.0(2)U6(1), 6.0(2)U6(2), 6.0(2)U6(3), 6.0(2)U6(4), and 6.0(2)U6(5) are affected on Nexus 3000 Series switches.

Versions 6.0(2)A6(1), 6.0(2)A6(2), 6.0(2)A6(3), 6.0(2)A6(4), 6.0(2)A6(5), and 6.0(2)A7(1) is affected on Nexus 3500 Platform switches.

The vendor has assigned bug ID CSCuy25800 to this vulnerability.

Impact:   A remote user can gain root access on the target device.
Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor's advisory.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC