CVE-2020-37092
Published: 03 February 2026
Summary
CVE-2020-37092 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Netis Systems (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Enables users to notice when hard-coded credentials have been exploited for unauthorized access.
Security training explicitly warns against hard-coded credentials, lowering their use in systems.
Policy and procedures prohibit hard-coded credentials in favor of managed authentication.
External identity providers eliminate the need for hard-coded credentials in applications.
Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.
Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.
Planned investment enables secure credential storage and management systems instead of hard-coded credentials.
NVD Description
Netis E1+ version 1.2.32533 contains a hardcoded root account vulnerability that allows unauthenticated attackers to access the device with predefined credentials. Attackers can leverage the embedded root account with a crackable password to gain full administrative access to the network…
more
device.
Deeper analysisAI
CVE-2020-37092 is a hardcoded root account vulnerability (CWE-798) in the Netis E1+ network device, specifically version 1.2.32533. This flaw embeds a root account with predefined credentials, enabling unauthorized access without authentication. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting its high severity due to network accessibility, low attack complexity, and significant confidentiality impact.
Unauthenticated remote attackers can exploit this vulnerability by leveraging the embedded root account and its crackable password. Successful exploitation grants full administrative access to the affected network device, potentially allowing attackers to control device functions, extract sensitive configuration data, or pivot to other network resources.
Advisories and related resources include the vendor site at http://www.netis-systems.com, an Exploit-DB entry at https://www.exploit-db.com/exploits/48382 detailing a public exploit, and a Vulncheck advisory at https://www.vulncheck.com/advisories/netis-e-backdoor-account-root focused on the backdoor root account. These references provide additional technical details that security practitioners should consult for mitigation guidance or patch availability.
Details
- CWE(s)