Description
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a backdoor account allowing a remote attacker to login to the system via SSH (on TCP port 22345) and escalate to root (because the password for root is the WebUI admin password concatenated with a static string).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-18538 | WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a backdoor account allowing a remote attacker to login to the system via SSH (on TCP port 22345) and escalate to root (because the password for root is the WebUI admin password concatenated with a static string). |
References
| Link | Providers |
|---|---|
| http://www.cnvd.org.cn/flaw/show/CNVD-2019-07680 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T21:38:46.570Z
Reserved: 2019-02-25T00:00:00.000Z
Link: CVE-2019-9160
No data.
Status : Modified
Published: 2019-04-18T22:29:00.577
Modified: 2024-11-21T04:51:06.547
Link: CVE-2019-9160
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD