First published: Thu Jun 04 2020(Updated: )
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | <=3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10548 is a vulnerability in rConfig 3.9.4 and previous versions that allows unauthenticated SQL injection in devices.inc.php.
CVE-2020-10548 has a severity rating of critical with a CVSS score of 9.8.
CVE-2020-10548 allows an attacker to perform SQL injection attacks leading to unauthorized access to monitored network devices in rConfig.
An attacker can exploit CVE-2020-10548 by sending specially crafted SQL injection queries to devices.inc.php in rConfig, potentially gaining access to network devices.
Yes, upgrading to a version of rConfig that is not vulnerable to CVE-2020-10548 will fix the issue.