A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T16:56:01.023Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3180

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.870Z

cve-icon NVD

Status : Modified

Published: 2020-07-16T18:15:16.940

Modified: 2024-11-21T05:30:29.670

Link: CVE-2020-3180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.