#VU48576 Weak password requirements in SD-WAN Orchestrator - CVE-2020-4001
Published: November 20, 2020
Vulnerability identifier: #VU48576
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-4001
CWE-ID: CWE-521
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
SD-WAN Orchestrator
SD-WAN Orchestrator
Software vendor:
VMware, Inc
VMware, Inc
Description
The vulnerability allows an attacker to gain unauthorized access to the system.
The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
The vendor recommends to change all default passwords of the preconfigured accounts on SD-WAN Orchestrator before production use.