Vulnerability Description
An issue was discovered in SolarWinds N-Central 12.3.0.670. Hard-coded Credentials exist by default for local user accounts named [email protected] and [email protected]. These allow logins to the N-Central Administrative Console (NAC) and/or the regular web interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Solarwinds | N-Central | 12.3.0.670 |
Related Weaknesses (CWE)
References
- https://ernw.de/en/publications.htmlThird Party Advisory
- https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/Third Party Advisory
- https://support.solarwinds.com/SuccessCenter/s/Vendor Advisory
- https://ernw.de/en/publications.htmlThird Party Advisory
- https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/Third Party Advisory
- https://support.solarwinds.com/SuccessCenter/s/Vendor Advisory
FAQ
What is CVE-2020-25620?
CVE-2020-25620 is a vulnerability with a CVSS score of 7.8 (HIGH). An issue was discovered in SolarWinds N-Central 12.3.0.670. Hard-coded Credentials exist by default for local user accounts named [email protected] and [email protected]. These allow logins to th...
How severe is CVE-2020-25620?
CVE-2020-25620 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25620?
Check the references section above for vendor advisories and patch information. Affected products include: Solarwinds N-Central.