(LiveHacking.Com) — Cisco has released a security advisory and a corresponding applied mitigation bulletin to address vulnerabilities in the Cisco TelePresence Recording Server Software Release 220.127.116.11. Cisco TelePresence is a in-person communication and collaboration tool.
According to Cisco, Version 18.104.22.168 of its TelePresence Recording Server Software includes a root administrator account that is enabled by default. Successful exploitation of this vulnerability could allow a remote attacker to use these default credentials to modify the system configuration and settings. An attacker could use this account to modify the system configuration and settings by means of an SSH session.
Cisco’s workaround involves the use of infrastructure access control lists (iACLs) to perform policy enforcement of traffic sent to the equipment. Administrators can construct an iACL to explicitly allow only authorized traffic to be sent to the infrastructure devices. However Cisco point out that the iACL workaround cannot provide complete protection against this vulnerability when the attack originates from a trusted source address.