Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:CISCO:REGISTRAR-AUTH-BYPASS

Severity

Medium

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Cisco Network Registrar Default Credentials Authentication Bypass

Release Date

2011/06/20

Update Number

1942

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Cisco Network Registrar Default Credentials Authentication Bypass


This signature detects attempts to exploit a known authentication bypass vulnerability in Cisco Network Registrar. It is due to use of default admin privileges. A successful attack can result in compromise of an admin account.

Extended Description

Cisco CNS Network Registrar is prone to a remote authentication-bypass vulnerability. An attacker can exploit this issue to gain unauthorized administrative access to the affected device. Successful exploits will result in the complete compromise of the affected device. This issue is being tracked by Cisco bug ID CSCsm50627.

Affected Products

  • Cisco CNS Network Registrar 7.0
  • Cisco CNS Network Registrar 7.1

References

  • BugTraq: 48076
  • CVE: CVE-2011-2024

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out