First published: Tue Dec 08 2020(Updated: )
The official znc docker images before 1.7.1-slim contain a blank password for a root user. Systems using the znc docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZNC Docker Image | =1.6 | |
ZNC Docker Image | =1.6-slim | |
ZNC Docker Image | =1.6.4 | |
ZNC Docker Image | =1.6.4-slim | |
ZNC Docker Image | =1.6.5 | |
ZNC Docker Image | =1.6.5-slim | |
ZNC Docker Image | =1.6.6 | |
ZNC Docker Image | =1.6.6-slim | |
ZNC Docker Image | =1.7.0 | |
ZNC Docker Image | =1.7.0-slim | |
ZNC Docker Image | =1.7.1-slim |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29577 is considered a high-severity vulnerability due to the potential for remote root access.
To fix CVE-2020-29577, upgrade to version 1.7.1-slim or later of the ZNC Docker image.
The affected versions in CVE-2020-29577 are all versions of the ZNC Docker image prior to 1.7.1-slim.
CVE-2020-29577 exposes systems to remote attacks that can lead to unauthorized root access.
There is no known workaround for CVE-2020-29577; the only solution is to upgrade to the fixed version.