Cisco patched a serious vulnerability

On November 1, Cisco corrected a critical flaw in the Security Agent Management Center software (CSAMC), which allowed hackers to remotely attack and bypass authentication mechanisms for unrestricted access. into the application.

CSAMC is used in configuring security policies for network servers and PCs. The vulnerability affects the CSAMC 5.1 version - the first version that can identify users through the Lightweight Directory Access Protocol (LDAP).

Picture 1 of Cisco patched a serious vulnerability If the CSAMC activates the LDAP option, the remote attacker can access the application's web interface by entering that admin username with an empty password.

Errors arising from the possibility of not being able to handle LDAP errors when the hollow password is entered by CSAMC. From that, it makes the software accept the validity of empty passwords.

According to Symantec's warning, successful hackers will be able to change the security policy in the CSAMC application, and thus help the hacker deploy the next attack. Symantec ranked the CSAMC vulnerability at an extremely serious level.

Also last week, Cisco patched a DoS vulnerability scanning ports in Cisco Security Agent (for Linux) - part of Cisco Unified CallManager (CUCM) and Cisco Unified Presence Server (CUPS).