12-20-2019 06:07 AM
Hello,
we need to solve variability on our cvp
CVE ID: CVE-2015-0225
THREAT:
Java JMX interface is accessible via following username/password pairs:
admin/password
admin/admin
admin/activemq
monitorRole/QED
controlRole/R%26D
controlrole/password
monitorrole/password
cassandra/cassandrapassword
monitorRole/tomcat
controlRole/tomcat
monitorRole/mrpasswd
controlRole/crpasswd
role1/role1passwd
role2/role2passwd
role3/role3passwd
admin/thisIsSupposedToBeAStrongPassword!
QID Detection Logic (Authenticated):
This QID tries to log into JMX RMI server using above credentials.
Note:if remote JMX RMI sever
accessible without authentication. all of above credentials will post.
IMPACT:
Successful exploitation allows attacker to execute arbitrary Java code.
SOLUTION:
Change the common password.
which password?
08-12-2021 09:44 AM
I opened a TAC case on this and this was TAC's response:
For CVP we have CSCvp98656 as enhancement request to harder access to JMX.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp98656
And the workaround is to disable JCONSOLE access with enable secure communication.
The problem is, the guide to do this is very ambiguous and the steps are not well explained. I have reached back out to TAC for clarity on this before I make these changes.
10-19-2021 06:44 PM
Hi,
Did you manage to find a solution for this. I am in the same boat and cisco TAC isn’t of much help. I am stumped at the CA signed client certificates and CA signed client certs for OAMP section.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide