If not patched, the flaw could allow a remote attacker to gain access to the Web-based interface of Cisco's CSAMC application by entering a valid administrative username along with a blank password, according to a company advisory.
Cisco on Wednesday patched a critical vulnerability in its Security Agent Management Center (CSAMC) software that could allow remote attackers to bypass authentication and gain unfettered access to the application.
CSAMC is used to configure security policies for networked servers and desktop PCs. The flaw affects CSAMC version 5.1 with hotfix prior to 22.214.171.124, which is the first version of the software that can authenticate users via the Lightweight Directory Access Protocol (LDAP).
If CSAMC has the LDAP option enabled, a remote attacker could gain access to the Web-based interface of the application by entering a valid administrative user name along with a blank password, according to a Cisco advisory.
The problem stems from CSAMC's inability to LDAP error responses when a blank password is entered, causing it to accept the blank password as valid, Cisco said.
A successful attacker would have the ability to change polices within the CSAMC application, which could assist them in launching additional attacks, Symantec said in a DeepSight Threat Management System advisory, which gave the vulnerability an aggregate threat score of 9.8 on a 10-point scale.
Last week, the San Jose, Calif.-based vendor patched a port scanning denial of service vulnerability in its Cisco Security Agent for Linux, which is part of Cisco Unified CallManager (CUCM) and Cisco Unified Presence Server (CUPS).
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.