First published: Fri Jun 26 2020(Updated: )
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded OAUTH_SECRET_KEY in /opt/axess/etc/default/axess.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel CloudCNM SecuManager | =3.1.0 | |
Zyxel CloudCNM SecuManager | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-15331.
CVE-2020-15331 has a severity rating of 9.8 (Critical).
The affected software is Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1.
The vulnerability is caused by a hardcoded OAUTH_SECRET_KEY in /opt/axess/etc/default/axess.
To fix CVE-2020-15331, it is recommended to update Zyxel CloudCNM SecuManager to a version that does not have the hardcoded OAUTH_SECRET_KEY.