CVE-2020-9425 Scanner
Detects 'Information Disclosure' vulnerability in rConfig affects v. before 3.9.4.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
30 seconds
Time Interval
4 weeks
Scan only one
URL
Toolbox
-
rConfig is a network configuration management tool that allows IT professionals to manage and organize network devices such as routers, switches, and firewalls. It facilitates the automation of network configuration backups and changes, and enables documentation of network changes.
The CVE-2020-9425 vulnerability that was discovered in rConfig before version 3.9.4 poses a significant security threat to enterprise networks that use this software. An unauthenticated attacker can retrieve saved cleartext credentials through a GET request to settings.php. The application does not exit after a redirect is applied, resulting in the disclosure of cleartext credentials in the response.
This vulnerability can lead to the theft of sensitive information that can be used to launch targeted cyber attacks on the network. If an attacker gains access to network devices by using stolen credentials, they can interfere with network traffic, steal confidential data, or plant malware. Additionally, a compromised network device can be used to pivot to other network segments and devices, leading to a more extensive compromise.
With the pro features of the s4e.io platform, users can quickly and easily detect vulnerabilities in their digital assets. By using the platform, users can scan their networks for security vulnerabilities, get customized remediation recommendations, and receive alerts for any new vulnerabilities that may arise. Take advantage of s4e.io to keep your digital assets safe from cyber threats.
REFERENCES