Vulnerability identifier: #VU48576
Vulnerability risk: Medium
Exploitation vector: Local network
Exploit availability: No
Vendor: VMware, Inc
The vulnerability allows an attacker to gain unauthorized access to the system.
The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
The vendor recommends to change all default passwords of the preconfigured accounts on SD-WAN Orchestrator before production use.
Vulnerable software versions
SD-WAN Orchestrator: 3.1.1, 3.1.2, 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.3.2 3.3.2-GA-20201103, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.4 R344-20201103-GA, 4.0.0, 4.0.0 R400-20201111-GA, 4.0.1, 4.0.1 R401-20201111-GA, 4.1.0, 4.1.0 R410-20201028-GA
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.