Cisco Telepresence Server has default password on root
The Cisco TelePresence Recording Server Software Release 220.127.116.11 has a root administrator account that is enabled by default with a default password, making it vulnerable to remote attackers. Attackers can, if they have knowledge of the default password, use SSH on port 22 to access the device and operate it as root. In an advisory, Cisco said the impact of the flaw could allow the attacker to modify the system credentials and settings.
Cisco says that a single customer reported a "potential exploitation" to them but they are not aware of widespread exploitation. Cisco says previous versions, 1.7.0 and 1.7.1, are not affected. The company has released a fixed version, 18.104.22.168 – customers are asked to contact Cisco directly for update. An "Applied Mitigation Bulletin" has also been released which essentially suggests blocking access to port 22 (SSH) to reduce the chance of being exploited.