Vulnslist

find the latest Cisco vulnerabilities

Cisco SD-WAN Solution Software Static Credentials Vulnerability

cisco-sa-sdscred-HfWWfqBj · High · Published · Updated

A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdscred-HfWWfqBj

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2020-3180
Cisco Bug IDsCSCvi59720, CSCvi85074
CVSS ScoreBase 8.4
Base 8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco SD-WAN vManage, Cisco SD-WAN vEdge router, Cisco Catalyst SD-WAN Manager, Cisco SD-WAN vEdge Router

Related Products

Product CVE Evidence
Cisco SD-WAN vManage CVE-2020-3180 Cisco OpenVuln
Cisco SD-WAN vEdge Router CVE-2020-3180 Cisco OpenVuln
Cisco SD-WAN Solution CVE-2020-3180 Cisco OpenVuln
Cisco Catalyst SD-WAN Manager CVE-2020-3180 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2020-3180 Cisco OpenVuln