Hardcoded Erlang Cookie Vulnerability in Zyxel CloudCNM SecuManager
CVE-2020-15325
5.3MEDIUM
Summary
The Zyxel CloudCNM SecuManager versions 3.1.0 and 3.1.1 contain a vulnerability due to a hardcoded Erlang cookie utilized for ejabberd replication. This hardcoded value may allow attackers to exploit the system, potentially gaining unauthorized access and control over the affected device. Users are advised to review their system configurations and apply necessary updates or mitigations as outlined in the vendor's security advisories.
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved