Vulnerability Details : CVE-2011-1623
Cisco Media Processing Software before 1.2 on Media Experience Engine (MXE) 5600 devices has a default root password, which makes it easier for context-dependent attackers to obtain access via (1) the local console, (2) an SSH session, or (3) a TELNET session, aka Bug ID CSCto77737.
Exploit prediction scoring system (EPSS) score for CVE-2011-1623
Probability of exploitation activity in the next 30 days: 0.40%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 70 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1623
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2011-1623
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1623
-
http://www.securitytracker.com/id?1025590
Cisco Media Experience Engine Default Credentials Grant Root Access to Remote Users - SecurityTracker
-
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml
Default Credentials for root Account on the Cisco Media Experience Engine 5600 - CiscoVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/67760
Cisco Media Experience Engine 5600 default password CVE-2011-1623 Vulnerability Report
-
http://www.securityfocus.com/bid/48078
Cisco Media Experience Engine 5600 Default Credentials Authentication Bypass Vulnerability
Products affected by CVE-2011-1623
- cpe:2.3:a:cisco:media_processing_software:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:media_processing_software:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:media_processing_software:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:media_processing_software:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:media_processing_software:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:media_experience_engine_5600:*:*:*:*:*:*:*:*