Default, Static Root Password Vulnerability in Cisco SD-WAN Solution Software

Default, Static Root Password Vulnerability in Cisco SD-WAN Solution Software

CVE-2020-3180 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges.

Learn more about our Cis Benchmark Audit For Cisco.