Hardcoded credentials in Cisco Virtual Wide Area Application Services (vWAAS)

Published: 2020-08-20
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-3446
Exploitation vector Network
Public exploit N/A
Vulnerable software
Cisco Wide Area Application Services
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use of hard-coded credentials

EUVDB-ID: #VU45809

Risk: High


CVE-ID: CVE-2020-3446


Exploit availability:


The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in Cisco Virtual Wide Area Application Services (vWAAS) with Cisco Enterprise NFV Infrastructure Software (NFVIS)-bundled images for Cisco ENCS 5400-W Series and CSP 5000-W Series. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Install updates from vendor's website.

This vulnerability affects Cisco ENCS 5400-W Series and CSP 5000-W Series appliances if they are running Cisco vWAAS with NFVIS-bundled image releases 6.4.5, or 6.4.3d and earlier.

Vulnerable software versions

Cisco Wide Area Application Services: 6.0.1 - 6.4.3d

Fixed software versions

CPE2.3 External links


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?