First published: Wed Nov 18 2020(Updated: )
A vulnerability in the web UI of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to obtain hashes of user passwords on an affected device. The vulnerability is due to insufficient protection of user credentials. An attacker could exploit this vulnerability by logging in as an administrative user and crafting a call for user information. A successful exploit could allow the attacker to obtain hashes of user passwords on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26079 has been rated as a medium severity vulnerability.
To mitigate CVE-2020-26079, users should upgrade Cisco IoT Field Network Director to version 4.6.1 or later.
CVE-2020-26079 affects users of Cisco IoT Field Network Director versions prior to 4.6.1.
CVE-2020-26079 is a credential disclosure vulnerability due to insufficient protection of user passwords.
Yes, an authenticated remote attacker can exploit CVE-2020-26079 to obtain user password hashes.