Cisco UCS Director Default Credentials (Web UI)

high Nessus Plugin ID 78769

Synopsis

The remote web application uses default credentials.

Description

It is possible to log into the remote Cisco UCS Director installation by providing the default credentials. A remote, unauthenticated attacker can exploit this to gain administrative control.

Solution

Secure any default accounts with a strong password.

Plugin Details

Severity: High

ID: 78769

File Name: cisco_ucs_director_default_creds_webui.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 10/31/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:cisco:ucs_director

Required KB Items: Host/Cisco/UCSDirector/WebUIVersion

Excluded KB Items: global_settings/supplied_logins_only