{"vuid":"VU#760432","idnumber":"760432","name":"Cisco Transaction Language 1 (TL1) interface fails to properly validate accounts with blank passwords","keywords":["Cisco","Transaction Language 1","TL1","Cisco Transport Controller","CTC","blank password","ten characters","bypass authentication"],"overview":"There is a vulnerability in the Cisco Transaction Language 1 (TL1) login interface that could allow a remote attacker to gain access to a Cisco ONS device.","clean_desc":"Transaction Language 1 (TL1) is a widely used telecommunications management protocol. A default account, CISCO15, contains a blank password, which is to be changed during the install process. There is a vulnerability in the way the TL1 login interface processes long passwords that could permit an attacker to access the Cisco ONS device for accounts that have a blank password. A remote attacker could successfully authenticate to such an account using any password longer than ten characters. The CISCO15 account has super-user privileges. Note: This issues does not affect the CTC login interface. Vulnerable: Cisco ONS 15327 Edge Optical Transport Platform releases: 4.6(0) and 4.6(1) Cisco ONS 15454 Optical Transport Platform releases: 4.6(0) and 4.6(1) Cisco ONS 15454 SDH Multiplexer Platform releases: 4.6(0) and 4.6(1) Not Vulnerable: Cisco ONS 15600 Multiservice Switching Platform","impact":"A remote attacker could gain access to an account with a blank password set.","resolution":"Upgrade\nPlease refer to the \"Software Versions and Fixes\" section of the Cisco Advisory for more information on upgrading.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \nthe Cisco Systems Product Security Incident Response Team (\nPSIRT","author":"This document was written by Damon Morda based on information provided by Cisco.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml","http://www.cisco.com/en/US/products/hw/optical/","http://www.tl1.com/library/TL1/TL1_Protocol/","http://www.cisco.com/en/US/products/hw/optical/ps2006/products_installation_and_configuration_guide_chapter09186a00800917bc.html","http://secunia.com/advisories/12117/","http://www.securitytracker.com/alerts/2004/Jul/1010748.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-07-21T18:56:50Z","publicdate":"2004-07-21T00:00:00Z","datefirstpublished":"2004-07-27T19:14:51Z","dateupdated":"2004-08-05T17:55:53Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"7","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"12","cam_scorecurrent":"7.0875","cam_scorecurrentwidelyknown":"8.26875","cam_scorecurrentwidelyknownexploited":"12.99375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.0875,"vulnote":null}