This security advisory describes one medium risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows an attacker to gain unauthorized access to the system.
The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.Vulnerable software versions
SD-WAN Orchestrator: 3.1.1, 3.1.2, 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.3.2 3.3.2-GA-20201103, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.4 R344-20201103-GA, 4.0.0, 4.0.0 R400-20201111-GA, 4.0.1, 4.0.1 R401-20201111-GA, 4.1.0, 4.1.0 R410-20201028-GACPE
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.