A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in to the underlying Linux operating system.
The vulnerability is due to a hard-coded account password on the system.
An attacker could exploit this vulnerability by connecting to the affected system via Secure Shell (SSH) using the hard-coded credentials.
A successful exploit could allow the attacker to access the underlying operating system as a low-privileged user.
After low-level privileges are gained, the attacker could elevate to root privileges and take full control of the device.
Note: Although this vulnerability has a Common Vulnerability Scoring System (CVSS) Base score of 5.9, which is normally assigned a Security Impact Rating (SIR) of Medium, there are extenuating circumstances that allow an attacker to elevate privileges to root.
For these reasons, the SIR has been set to Critical.
Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
Security Impact Rating: Critical