CVE-2020-4001Initialization of a Resource with an Insecure Default in Vmware Sd-wan Orchestrator

Severity
9.8CRITICALNVD
EPSS
9.9%
top 7.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 24
Latest updateMay 24

Description

The SD-WAN Orchestrator 3.3.2, 3.4.x, and 4.0.x has default passwords allowing for a Pass-the-Hash Attack. SD-WAN Orchestrator ships with default passwords for predefined accounts which may lead to to a Pass-the-Hash attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDvmware/sd-wan_orchestrator3.4.03.4.4+2

🔴Vulnerability Details

2
GHSA
GHSA-fxm9-pj4r-698p: The SD-WAN Orchestrator 32022-05-24
CVEList
CVE-2020-4001: The SD-WAN Orchestrator 32020-11-24

🔍Detection Rules

1
Suricata
ET EXPLOIT VMware SD-WAN Orchestrator Authentication Bypass (CVE-2020-4001)2022-02-04

📋Vendor Advisories

1
VMware
VMware SD-WAN Orchestrator updates address multiple security vulnerabilities (CVE-2020-3984, CVE-2020-3985, CVE-2020-4000, CVE-2020-4001, CVE-2020-4002 ,CVE-2020-4003)2020-11-18
CVE-2020-4001 — Vmware vulnerability | cvebase