4.9 • 696 Ratings
🗓️ 9 June 2017
⏱️ 13 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, June 9th, 2017 edition of the Sandtonet Storm Center's Stormcast. |
0:07.3 | My name is Johannes Ulrich, and today I'm recording from Washington, D.C. |
0:12.2 | Cisco patched a number of its products this week. |
0:15.5 | Now, among these patches, there are two-born abilities that I found particularly interesting. Both of them |
0:22.5 | affect the Cisco Prime Data Center Network Manager. The first one actually bypasses authentication |
0:29.7 | for the system because Cisco, by mistake, left a debug tool enabled that does not require authentication. Exploitation should be pretty |
0:42.1 | straightforward and may happen across the network. This vulnerability will allow an attacker to |
0:48.9 | execute arbitrary command on the device as route. The second vulnerability is good old default static credentials as |
0:57.4 | you install this tool. A default account is created. The user is not informed about this default |
1:03.8 | account and access to this account, again across the network, could allow access to the |
1:10.0 | administrative console of the device. |
1:13.7 | According to Cisco, there are no workarounds, so get on patching, given the simplicity of |
1:19.9 | exploiting these vulnerabilities and the impact they may have, you also should make sure |
1:25.3 | that there is no remote network access to this system. |
1:31.0 | And talking about default accounts, ERP scan did release a nice blog post, listing all the default |
1:37.5 | accounts that you commonly find in Oracle's PeopleSoft, including the passwords typically |
1:43.5 | associated with these accounts. |
1:46.1 | So great resource in case you need to audit Oracle's PeopleSoft. |
1:51.1 | And while sticking with default passwords for yet another story, F-Secure released paper |
1:58.5 | with details about vulnerabilities in Opticam and FOSCAM digital video cameras. |
2:05.6 | These are web-based network cameras and of course they have caused a lot of pain for network |
2:12.6 | administrators in the past. Yet again, default passwords, telnet servers that are not documented, but enabled and |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.