Cisco Web Security Appliance Static Credentials Vulnerability
The vulnerability is due to a user account that has a default and static password. An attacker could exploit this vulnerability by connecting to the affected system using this default account. An exploit could allow the attacker to log in with the default credentials, allowing the attacker to view the system's serial number by using the CLI or to download reports by using the web interface.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2uyZq3O
The vulnerability is due to a user account that has a default and static password. An attacker could exploit this vulnerability by connecting to the affected system using this default account. An exploit could allow the attacker to log in with the default credentials, allowing the attacker to view the system's serial number by using the CLI or to download reports by using the web interface.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2uyZq3O
Security Impact Rating: Medium
CVE: CVE-2017-6750
from Cisco Security Advisory http://ift.tt/2uyZq3O