A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.
History

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-07-16T17:20:38.219927Z

Updated: 2024-11-15T16:56:01.023Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3180

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.870Z

cve-icon NVD

Status : Modified

Published: 2020-07-16T18:15:16.940

Modified: 2024-11-21T05:30:29.670

Link: CVE-2020-3180

cve-icon Redhat

No data.