Vulnerability Description
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyesofnetwork | Eyesofnetwork | 5.3-0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-CExploitThird Party AdvisoryVDB Entry
- https://github.com/EyesOfNetworkCommunity/eonapi/issues/17Third Party Advisory
- http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-CExploitThird Party AdvisoryVDB Entry
- https://github.com/EyesOfNetworkCommunity/eonapi/issues/17Third Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-US Government Resource
FAQ
What is CVE-2020-8657?
CVE-2020-8657 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, henc...
How severe is CVE-2020-8657?
CVE-2020-8657 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8657?
Check the references section above for vendor advisories and patch information. Affected products include: Eyesofnetwork Eyesofnetwork.