NETSCOUT AirMagnet Enterprise 11.1.4 build 37257 and earlier has a sensor escalated privileges vulnerability that can be exploited to provide someone with administrative access to a sensor, with credentials to invoke a command to provide root access to the operating system. The attacker must complete a straightforward password-cracking exercise.
References
Link | Resource |
---|---|
https://www.netscout.com/products | Product |
https://www.netscout.com/securityadvisories | Vendor Advisory |
https://www.netscout.com/products | Product |
https://www.netscout.com/securityadvisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.netscout.com/products - Product | |
References | () https://www.netscout.com/securityadvisories - Vendor Advisory |
Information
Published : 2020-12-03 17:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28251
Mitre link : CVE-2020-28251
CVE.ORG link : CVE-2020-28251
JSON object : View
Products Affected
netscout
- sensor6-r2s1-e
- sensor4-r2s1-i
- sensor6-r2s1-i
- airmagnet_enterprise
- sensor6-r1s0w1-e
- sensor4-r1s1w1-e
- sensor4-r2s1-e
CWE