Loading HuntDB...

Authentication bypass and potential RCE on the https://████ due to exposed Cisco TelePresence SX80 with default credentials

High
U
U.S. Dept Of Defense
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
##Description Hello. I was able to identify another one Cisco TelePresence SX80 device located on the https://████████ right near the previous device `████` (after #684070 report I decided to check ████* range) According to the IP Info: https://ipinfo.io/AS257/████0/24 it belongs to ASN with ID ``` AS257 ███ ``` The mentioned instance has same credentials `admin:admin`. This instance is different and less used, the logs reveals that last time device was used in 2017 year. ##POC https://████████ Login with `admin:admin` ███████ Since we are logged in as admin, we can completely control the device and all connections, and add our startup scripts via https://███████/web/scripts thus achiecing code execution. ##Suggested fix Change the credentials and likely you will need to reset the device to factory settings ## Impact Potential device compromise and code execution. This devices are used mainly for trainings, briefings, and demonstration rooms, as well as auditoriums, so attacker with full control of the device potentially can intercept the data (RCE potential is interesting, but ability to silently compromise the device and use it as backdoor can be much more harmful).

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic