First published: Thu Jun 04 2020(Updated: )
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | <=3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10549 is critical with a CVSS score of 9.8.
CVE-2020-10549 is a vulnerability in rConfig 3.9.4 and previous versions that allows unauthenticated SQL injection.
CVE-2020-10549 allows an attacker to perform an unauthenticated SQL injection attack, potentially gaining access to monitored network devices.
To fix CVE-2020-10549, you should update to a patched version of rConfig.
Yes, you can find more details about CVE-2020-10549 in the references provided.