Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE ID | CVE-2020-4001 |
CWE ID | CWE-521 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
SD-WAN Orchestrator Server applications / Virtualization software |
Vendor | VMware, Inc |
This security advisory describes one medium risk vulnerability.
Risk: Medium
CVSSv3: 3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2020-4001
CWE-ID:
CWE-521 - Weak Password Requirements
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain unauthorized access to the system.
The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSD-WAN Orchestrator: 3.1.1, 3.1.2, 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.3.2 3.3.2-GA-20201103, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.4 R344-20201103-GA, 4.0.0, 4.0.0 R400-20201111-GA, 4.0.1, 4.0.1 R401-20201111-GA, 4.1.0, 4.1.0 R410-20201028-GA
CPEhttps://www.vmware.com/security/advisories/VMSA-2020-0025.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.