10
CVE-2020-26201
- EPSS 0.66%
- Veröffentlicht 10.12.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:19:31
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Askey ≫ Ap5100w Firmware Version <= 1.01.097
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.66% | 0.703 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-521 Weak Password Requirements
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.