Cyber Posture

CVE-2020-37092

HighPublic PoC

Published: 03 February 2026

Published
03 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 18.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37092 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Netis Systems (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-798

Enables users to notice when hard-coded credentials have been exploited for unauthorized access.

addresses: CWE-798

Security training explicitly warns against hard-coded credentials, lowering their use in systems.

addresses: CWE-798

Policy and procedures prohibit hard-coded credentials in favor of managed authentication.

addresses: CWE-798

External identity providers eliminate the need for hard-coded credentials in applications.

addresses: CWE-798

Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.

addresses: CWE-798

Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.

addresses: CWE-798

Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.

addresses: CWE-798

Planned investment enables secure credential storage and management systems instead of hard-coded credentials.

NVD Description

Netis E1+ version 1.2.32533 contains a hardcoded root account vulnerability that allows unauthenticated attackers to access the device with predefined credentials. Attackers can leverage the embedded root account with a crackable password to gain full administrative access to the network…

more

device.

Deeper analysisAI

CVE-2020-37092 is a hardcoded root account vulnerability (CWE-798) in the Netis E1+ network device, specifically version 1.2.32533. This flaw embeds a root account with predefined credentials, enabling unauthorized access without authentication. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting its high severity due to network accessibility, low attack complexity, and significant confidentiality impact.

Unauthenticated remote attackers can exploit this vulnerability by leveraging the embedded root account and its crackable password. Successful exploitation grants full administrative access to the affected network device, potentially allowing attackers to control device functions, extract sensitive configuration data, or pivot to other network resources.

Advisories and related resources include the vendor site at http://www.netis-systems.com, an Exploit-DB entry at https://www.exploit-db.com/exploits/48382 detailing a public exploit, and a Vulncheck advisory at https://www.vulncheck.com/advisories/netis-e-backdoor-account-root focused on the backdoor root account. These references provide additional technical details that security practitioners should consult for mitigation guidance or patch availability.

Details

CWE(s)

Affected Products

Netis Systems
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-24346Shared CWE-798
CVE-2025-27643Shared CWE-798
CVE-2025-35451Shared CWE-798
CVE-2025-40537Shared CWE-798
CVE-2024-53356Shared CWE-798
CVE-2025-7401Shared CWE-798
CVE-2025-26410Shared CWE-798
CVE-2025-1393Shared CWE-798
CVE-2026-25202Shared CWE-798
CVE-2026-23647Shared CWE-798

References