Vulnerability identifier: #VU48576
Vulnerability risk: Medium
CVSSv3.1: 6.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-521
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
SD-WAN Orchestrator
Server applications /
Virtualization software
Vendor: VMware, Inc
Description
The vulnerability allows an attacker to gain unauthorized access to the system.
The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
The vendor recommends to change all default passwords of the preconfigured accounts on SD-WAN Orchestrator before production use.
Vulnerable software versions
SD-WAN Orchestrator: 3.1.1 - 4.1.0 R410-20201028-GA
External links
http://www.vmware.com/security/advisories/VMSA-2020-0025.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.