CVE-2020-9425 Scanner

Detects 'Information Disclosure' vulnerability in rConfig affects v. before 3.9.4.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

30 seconds

Time Interval

4 weeks

Scan only one

URL

Toolbox

-

rConfig is a network configuration management tool that allows IT professionals to manage and organize network devices such as routers, switches, and firewalls. It facilitates the automation of network configuration backups and changes, and enables documentation of network changes.

The CVE-2020-9425 vulnerability that was discovered in rConfig before version 3.9.4 poses a significant security threat to enterprise networks that use this software. An unauthenticated attacker can retrieve saved cleartext credentials through a GET request to settings.php. The application does not exit after a redirect is applied, resulting in the disclosure of cleartext credentials in the response.

This vulnerability can lead to the theft of sensitive information that can be used to launch targeted cyber attacks on the network. If an attacker gains access to network devices by using stolen credentials, they can interfere with network traffic, steal confidential data, or plant malware. Additionally, a compromised network device can be used to pivot to other network segments and devices, leading to a more extensive compromise.

With the pro features of the s4e.io platform, users can quickly and easily detect vulnerabilities in their digital assets. By using the platform, users can scan their networks for security vulnerabilities, get customized remediation recommendations, and receive alerts for any new vulnerabilities that may arise. Take advantage of s4e.io to keep your digital assets safe from cyber threats.

 

REFERENCES

Get started to protecting your Free Full Security Scan