[原文]Cisco devices running Application and Content Networking System (ACNS) 4.x, 5.0, 5.1, or 5.2 use a default password when the setup dialog has not been run, which allows remote attackers to gain access.
[CNNVD]Cisco Application and Content Networking System 权限管理和访问控制漏洞(CNNVD-200505-465)
运行Application and Content Networking System (ACNS) 4.x，5.0，5.1或5.2版本的Cisco设备，在设置对话框未运行的情况下，使用默认的密码，从而允许远程攻击者获取访问权限。
By default, Cisco ACNS devices ship with a default password. The Administrator account has a default password which is publicly known and documented. This allows attackers to trivially access the program or system.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): change the default password