Rewterz
Rewterz Threat Advisory – Mozilla Firefox Multiple Vulnerabilities
November 19, 2020
Rewterz
Rewterz Threat Advisory – CVE-2020-5668 – ICS: Mitsubishi Electric MELSEC iQ-R Series
November 20, 2020

Rewterz Threat Advisory – Multiple VMware SD-WAN Orchestrator Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2020-4003

VMware SD-WAN Orchestrator is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVE-2020-4002

VMware SD-WAN Orchestrator could allow a remote authenticated attacker to execute arbitrary code on the system, caused by the improper handling of system parameters. An attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2020-3985

VMware SD-WAN Orchestrator could allow a remote authenticated attacker to gain elevated privileges on the system, caused by an application weakness. By invoking a vulnerable API, an attacker could exploit this vulnerability to gain elevated privileges on the system.

CVE-2020-4001

VMware SD-WAN Orchestrator contains default passwords for predefined accounts. An attacker could exploit this vulnerability using the default passwords to lead to a Pass-the-Hash attack.

CVE-2020-4000

VMware SD-WAN Orchestrator could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to execute arbitrary files on the system.

CVE-2020-3984

VMware SD-WAN Orchestrator is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to a vulnerable API call, which could allow the attacker to view, add, modify or delete information in the back-end database.

Impact

  • Data Manipulation
  • Gain Access
  •  SQL injection

Affected Vendors

VMware

Affected Products

  • VMware SD-WAN Orchestrator 4.0
  • VMware SD-WAN Orchestrator 3.0

Remediation

Refer to VMware advisory for the complete list of affected products and their respective patches.

https://www.vmware.com/security/advisories.html