{"vuid":"VU#626420","idnumber":"626420","name":"Pearson ProctorCache contains hard coded credentials","keywords":["hard coded password","DoS","CWE-259"],"overview":"The Pearson ProctorCache software uses a hard coded password for administrative tasks.","clean_desc":"The ProctorCache is designed to cache the testing content, as well as cache the responses and maintain a client list of active test-takers. ProctorCache is a server software package installed locally within the LAN on a Windows system. CWE-259: Use of Hard-coded Password - CVE-2015-0972 ProctorCache prior to version 2015.1.17 requires authentication to perform administrative tasks. However, the authentication consists of a hard-coded administrative password, which is not unique per installation, and cannot be changed.","impact":"An attacker on the local network can use the credentials to interrupt a test session and perform administrative tasks such as canceling tests or deleting users. According to Pearson, the actual test data is encrypted and not immediately accessible by an administrator.","resolution":"Apply an update Pearson has released ProctorCache version 2015.1.17 to address this issue by allowing the password to be changed. Affected users will be notified directly by Pearson of the update, and should update their software to version 2015.1.17 or later as soon as possible. The location of the upgrade as well as instructions for changing the ProctorCache password will be provided for download in the notification to existing customers.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Garret Wassermann.","public":["h","t","t","p","s",":","/","/","s","u","p","p","o","r","t",".","a","s","s","e","s","s","m","e","n","t",".","p","e","a","r","s","o","n",".","c","o","m","/","d","i","s","p","l","a","y","/","T","N","/","I","n","s","t","a","l","l","+","P","r","o","c","t","o","r","C","a","c","h","e"],"cveids":["CVE-2015-0972"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-01-21T18:20:52Z","publicdate":"2015-06-15T00:00:00Z","datefirstpublished":"2015-06-16T14:31:29Z","dateupdated":"2015-06-16T14:32:44Z","revision":66,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.2","cvss_basevector":"AV:A/AC:L/Au:S/C:N/I:P/A:C","cvss_temporalscore":"5.1","cvss_environmentalscore":"1.2784139949798","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}