cisco iot-field-network-director CVE-2020-26079 is a vulnerability in Cisco Iot Field Network Director
Published on November 18, 2020

Cisco IoT Field Network Director Unprotected Storage of Credentials Vulnerability
A vulnerability in the web UI of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to obtain hashes of user passwords on an affected device. The vulnerability is due to insufficient protection of user credentials. An attacker could exploit this vulnerability by logging in as an administrative user and crafting a call for user information. A successful exploit could allow the attacker to obtain hashes of user passwords on an affected device.

Vendor Advisory NVD

Weakness Type

Unprotected Storage of Credentials

Storing a password in plaintext may result in a system compromise. Password management issues occur when a password is stored in plaintext in an application's properties or configuration file. Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource.


Products Associated with CVE-2020-26079

Want to know whenever a new CVE is published for Cisco Iot Field Network Director? stack.watch will email you.

 

Affected Versions

Cisco IoT Field Network Director (IoT-FND) Version n/a is affected by CVE-2020-26079

Exploit Probability

EPSS
0.17%
Percentile
37.74%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.