First published: Wed Jul 29 2020(Updated: )
Certain builds of NEC SV9100 software could allow an unauthenticated, remote attacker to log into a device running an affected release with a hardcoded username and password, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with manufacturer privilege level. An attacker could exploit this vulnerability by using this account to remotely log into an affected device. A successful exploit could allow the attacker to log into the device with manufacturer level access. This vulnerability affects SV9100 PBXes that are running software release 6.0 or higher. This vulnerability does not affect SV9100 software releases prior to 6.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Sv9100 Firmware | >=6.0 | |
NEC SV9100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20025 is a vulnerability in certain builds of NEC SV9100 software that could allow an unauthenticated remote attacker to log into a device with a hardcoded username and password.
CVE-2019-20025 has a severity rating of 9.8 (Critical).
CVE-2019-20025 affects certain builds of NEC SV9100 software, allowing an unauthenticated remote attacker to log into a device with a hardcoded username and password.
No, NEC SV9100 firmware version 6.0 and later is affected, while the NEC SV9100 hardware is not vulnerable.
To fix CVE-2019-20025, apply the latest patch or update provided by NEC to remove the hardcoded username and password.