Cisco Patches Flaw In Security Agent Software
CSAMC is used to configure security policies for networked servers and desktop PCs. The flaw affects CSAMC version 5.1 with hotfix prior to 5.1.0.79, which is the first version of the software that can authenticate users via the Lightweight Directory Access Protocol (LDAP).
If CSAMC has the LDAP option enabled, a remote attacker could gain access to the Web-based interface of the application by entering a valid administrative user name along with a blank password, according to a Cisco advisory.
The problem stems from CSAMC's inability to LDAP error responses when a blank password is entered, causing it to accept the blank password as valid, Cisco said.
A successful attacker would have the ability to change polices within the CSAMC application, which could assist them in launching additional attacks, Symantec said in a DeepSight Threat Management System advisory, which gave the vulnerability an aggregate threat score of 9.8 on a 10-point scale.
Last week, the San Jose, Calif.-based vendor patched a port scanning denial of service vulnerability in its Cisco Security Agent for Linux, which is part of Cisco Unified CallManager (CUCM) and Cisco Unified Presence Server (CUPS).