8.4

CVE-2020-3180

A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.

Data is provided by the National Vulnerability Database (NVD)
CiscoSd-wan Version >= 18.3.0 < 18.3.6
   Cisco1100-4g Integrated Services Router Version-
   Cisco1100-4gltegb Integrated Services Router Version-
   Cisco1100-4gltena Integrated Services Router Version-
   Cisco1100-6g Integrated Services Router Version-
   Cisco1100 Integrated Services Router Version-
   CiscoVedge 100 Version-
   CiscoVedge 1000 Version-
   CiscoVedge 100b Version-
   CiscoVedge 100m Version-
   CiscoVedge 100wm Version-
   CiscoVedge 2000 Version-
   CiscoVedge 5000 Version-
CiscoSd-wan Version >= 18.4.0 < 18.4.5
CiscoSd-wan Version >= 19.2.0 < 19.2.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.241
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
psirt@cisco.com 8.4 2.5 5.9
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.