search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Pearson ProctorCache contains hard coded credentials

Vulnerability Note VU#626420

Original Release Date: 2015-06-16 | Last Revised: 2015-06-16

Overview

The Pearson ProctorCache software uses a hard coded password for administrative tasks.

Description

The ProctorCache is designed to cache the testing content, as well as cache the responses and maintain a client list of active test-takers. ProctorCache is a server software package installed locally within the LAN on a Windows system.

CWE-259: Use of Hard-coded Password - CVE-2015-0972

ProctorCache prior to version 2015.1.17 requires authentication to perform administrative tasks. However, the authentication consists of a hard-coded administrative password, which is not unique per installation, and cannot be changed.

Impact

An attacker on the local network can use the credentials to interrupt a test session and perform administrative tasks such as canceling tests or deleting users. According to Pearson, the actual test data is encrypted and not immediately accessible by an administrator.

Solution

Apply an update

Pearson has released ProctorCache version 2015.1.17 to address this issue by allowing the password to be changed. Affected users will be notified directly by Pearson of the update, and should update their software to version 2015.1.17 or later as soon as possible. The location of the upgrade as well as instructions for changing the ProctorCache password will be provided for download in the notification to existing customers.

Vendor Information

626420
 

Pearson Education Affected

Notified:  January 23, 2015 Updated: June 16, 2015

Statement Date:   March 09, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.2 AV:A/AC:L/Au:S/C:N/I:P/A:C
Temporal 5.1 E:F/RL:OF/RC:C
Environmental 1.3 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-0972
Date Public: 2015-06-15
Date First Published: 2015-06-16
Date Last Updated: 2015-06-16 14:32 UTC
Document Revision: 66

Sponsored by CISA.