APP: Cisco Network Registrar Default Credentials Authentication Bypass

This signature detects attempts to exploit a known authentication bypass vulnerability in Cisco Network Registrar. It is due to use of default admin privileges. A successful attack can result in compromise of an admin account.

Extended Description

Cisco CNS Network Registrar is prone to a remote authentication-bypass vulnerability. An attacker can exploit this issue to gain unauthorized administrative access to the affected device. Successful exploits will result in the complete compromise of the affected device. This issue is being tracked by Cisco bug ID CSCsm50627.

Affected Products

Cisco cns_network_registrar

References

BugTraq: 48076

CVE: CVE-2011-2024

Short Name
APP:CISCO:REGISTRAR-AUTH-BYPASS
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Authentication Bypass CVE-2011-2024 Cisco Credentials Default Network Registrar bid:48076
Release Date
06/20/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Cisco

CVSS Score

10.0

Found a potential security threat?