A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.
2020-07-16T18:15:16.940
2024-11-21T05:30:29.670
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | sd-wan | < 18.3.6 | Yes |
Hardware | cisco | 1100-4g_integrated_services_router | - | No |
Hardware | cisco | 1100-4gltegb_integrated_services_router | - | No |
Hardware | cisco | 1100-4gltena_integrated_services_router | - | No |
Hardware | cisco | 1100-6g_integrated_services_router | - | No |
Hardware | cisco | 1100_integrated_services_router | - | No |
Hardware | cisco | vedge_100 | - | No |
Hardware | cisco | vedge_1000 | - | No |
Hardware | cisco | vedge_100b | - | No |
Hardware | cisco | vedge_100m | - | No |
Hardware | cisco | vedge_100wm | - | No |
Hardware | cisco | vedge_2000 | - | No |
Hardware | cisco | vedge_5000 | - | No |
Application | cisco | sd-wan | < 18.4.5 | Yes |
Application | cisco | sd-wan | < 19.2.2 | Yes |