A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-07-16T17:20:38.219927Z
Updated: 2024-11-15T16:56:01.023Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3180
Vulnrichment
Updated: 2024-08-04T07:24:00.870Z
NVD
Status : Modified
Published: 2020-07-16T18:15:16.940
Modified: 2024-11-21T05:30:29.670
Link: CVE-2020-3180
Redhat
No data.