Lucene search

K
nvd[email protected]NVD:CVE-2020-3446
HistoryAug 26, 2020 - 5:15 p.m.

CVE-2020-3446

2020-08-2617:15:13
CWE-798
web.nvd.nist.gov
6

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.005

Percentile

76.2%

A vulnerability in Cisco Virtual Wide Area Application Services (vWAAS) with Cisco Enterprise NFV Infrastructure Software (NFVIS)-bundled images for Cisco ENCS 5400-W Series and CSP 5000-W Series appliances could allow an unauthenticated, remote attacker to log into the NFVIS CLI of an affected device by using accounts that have a default, static password. The vulnerability exists because the affected software has user accounts with default, static passwords. An attacker with access to the NFVIS CLI of an affected device could exploit this vulnerability by logging into the CLI. A successful exploit could allow the attacker to access the NFVIS CLI with administrator privileges.

Affected configurations

Nvd
Node
ciscoencs_5406-w_firmwareMatch6.4\(1\)
OR
ciscoencs_5406-w_firmwareMatch6.4\(3d\)
AND
ciscoencs_5406-wMatch-
Node
ciscoencs_5408-w_firmwareMatch6.4\(1\)
OR
ciscoencs_5408-w_firmwareMatch6.4\(3d\)
AND
ciscoencs_5408-wMatch-
Node
ciscoencs_5412-w_firmwareMatch6.4\(1\)
OR
ciscoencs_5412-w_firmwareMatch6.4\(3d\)
AND
ciscoencs_5412-wMatch-
Node
ciscocsp_5228-w_firmwareMatch6.4\(1\)
OR
ciscocsp_5228-w_firmwareMatch6.4\(3d\)
AND
ciscocsp_5228-wMatch-
Node
ciscocsp_5436-w_firmwareMatch6.4\(1\)
OR
ciscocsp_5436-w_firmwareMatch6.4\(3d\)
AND
ciscocsp_5436-wMatch-
VendorProductVersionCPE
ciscoencs_5406-w_firmware6.4(1)cpe:2.3:o:cisco:encs_5406-w_firmware:6.4\(1\):*:*:*:*:*:*:*
ciscoencs_5406-w_firmware6.4(3d)cpe:2.3:o:cisco:encs_5406-w_firmware:6.4\(3d\):*:*:*:*:*:*:*
ciscoencs_5406-w-cpe:2.3:h:cisco:encs_5406-w:-:*:*:*:*:*:*:*
ciscoencs_5408-w_firmware6.4(1)cpe:2.3:o:cisco:encs_5408-w_firmware:6.4\(1\):*:*:*:*:*:*:*
ciscoencs_5408-w_firmware6.4(3d)cpe:2.3:o:cisco:encs_5408-w_firmware:6.4\(3d\):*:*:*:*:*:*:*
ciscoencs_5408-w-cpe:2.3:h:cisco:encs_5408-w:-:*:*:*:*:*:*:*
ciscoencs_5412-w_firmware6.4(1)cpe:2.3:o:cisco:encs_5412-w_firmware:6.4\(1\):*:*:*:*:*:*:*
ciscoencs_5412-w_firmware6.4(3d)cpe:2.3:o:cisco:encs_5412-w_firmware:6.4\(3d\):*:*:*:*:*:*:*
ciscoencs_5412-w-cpe:2.3:h:cisco:encs_5412-w:-:*:*:*:*:*:*:*
ciscocsp_5228-w_firmware6.4(1)cpe:2.3:o:cisco:csp_5228-w_firmware:6.4\(1\):*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.005

Percentile

76.2%

Related for NVD:CVE-2020-3446