Loading HuntDB...

Authentication bypass and RCE on the https://████ due to exposed Cisco TelePresence SX80 with default credentials

Critical
U
U.S. Dept Of Defense
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
##Description Hello. I was able to identify Cisco TelePresence SX80 device located on the https://█████ According to the IP Info: https://ipinfo.io/████████it belongs to ASN with ID ``` ███████ ``` so it's likely in scope of the program. The mentioned instance has default credentials `████` ##POC https://███████ Login with `█████████` ████ Since we are logged in as ███, we can completely control the device and all connections, and add our startup scripts via https://██████████/web/scripts ##Suggested fix Change the credentials and likely you will need to reset the device ## Impact Potential device compromise and code execution. This devices are used mainly for trainings, briefings, and demonstration rooms, as well as auditoriums, so attacker with full control of the device potentially can intercept the data (RCE potential is interesting, but ability to silently compromise the device and use it as backdoor can be much more harmful).

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic