#VU48576 Weak password requirements


Published: 2020-11-20

Vulnerability identifier: #VU48576

Vulnerability risk: Medium

CVSSv3: 6.9 [CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-4001

CWE-ID: CWE-521

Exploitation vector: Local network

Exploit availability: No

Vulnerable software: SD-WAN Orchestrator
Server applications / Virtualization software

Vendor: VMware, Inc

Description

The vulnerability allows an attacker to gain unauthorized access to the system.

The vulnerability exists due to the same salt is used in conjunction with the default password of predefined accounts on freshly installed systems allowing for for Pass-the-Hash-Attacks. That same system could be accessed by an attacker using the default password for the predefined account.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

The vendor recommends to change all default passwords of the preconfigured accounts on SD-WAN Orchestrator before production use.

Vulnerable software versions

SD-WAN Orchestrator: 3.1.1, 3.1.2, 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.3.2 3.3.2-GA-20201103, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.4 R344-20201103-GA, 4.0.0, 4.0.0 R400-20201111-GA, 4.0.1, 4.0.1 R401-20201111-GA, 4.1.0, 4.1.0 R410-20201028-GA

CPE

External links
https://www.vmware.com/security/advisories/VMSA-2020-0025.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability