Vulnerability Details CVE-2020-10549
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.916
EPSS Ranking 99.7%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2020-10549
-
cpe:2.3:a:rconfig:rconfig:1.0.0
-
cpe:2.3:a:rconfig:rconfig:1.0.11
-
cpe:2.3:a:rconfig:rconfig:1.1.2
-
cpe:2.3:a:rconfig:rconfig:1.2.0
-
cpe:2.3:a:rconfig:rconfig:1.2.4
-
cpe:2.3:a:rconfig:rconfig:1.2.5
-
cpe:2.3:a:rconfig:rconfig:1.2.6
-
cpe:2.3:a:rconfig:rconfig:1.2.7
-
cpe:2.3:a:rconfig:rconfig:1.2.8
-
cpe:2.3:a:rconfig:rconfig:1.2.9
-
cpe:2.3:a:rconfig:rconfig:2.0.0
-
cpe:2.3:a:rconfig:rconfig:2.0.1
-
cpe:2.3:a:rconfig:rconfig:2.0.3
-
cpe:2.3:a:rconfig:rconfig:3.0.0
-
cpe:2.3:a:rconfig:rconfig:3.0.1
-
cpe:2.3:a:rconfig:rconfig:3.0.2
-
cpe:2.3:a:rconfig:rconfig:3.0.3
-
cpe:2.3:a:rconfig:rconfig:3.1.0
-
cpe:2.3:a:rconfig:rconfig:3.1.1
-
cpe:2.3:a:rconfig:rconfig:3.5.0
-
cpe:2.3:a:rconfig:rconfig:3.5.1
-
cpe:2.3:a:rconfig:rconfig:3.5.2
-
cpe:2.3:a:rconfig:rconfig:3.5.4
-
cpe:2.3:a:rconfig:rconfig:3.6.0
-
cpe:2.3:a:rconfig:rconfig:3.6.7
-
cpe:2.3:a:rconfig:rconfig:3.6.8
-
cpe:2.3:a:rconfig:rconfig:3.6.9
-
cpe:2.3:a:rconfig:rconfig:3.7.5
-
cpe:2.3:a:rconfig:rconfig:3.8.0
-
cpe:2.3:a:rconfig:rconfig:3.8.6
-
cpe:2.3:a:rconfig:rconfig:3.8.7
-
cpe:2.3:a:rconfig:rconfig:3.9.0
-
cpe:2.3:a:rconfig:rconfig:3.9.1
-
cpe:2.3:a:rconfig:rconfig:3.9.2
-
cpe:2.3:a:rconfig:rconfig:3.9.3
-
cpe:2.3:a:rconfig:rconfig:3.9.4