Learn about CVE-2019-9160 affecting Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier. Discover the impact, technical details, and mitigation steps for this vulnerability.
Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier is vulnerable to a backdoor account exploit known as WAC, allowing unauthorized remote access and privilege escalation.
Understanding CVE-2019-9160
This CVE involves a hidden account in the Sangfor Sundray WLAN Controller, enabling attackers to gain root privileges through SSH access.
What is CVE-2019-9160?
The vulnerability in the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier allows unauthorized access to the system via SSH on TCP port 22345, leading to root privilege escalation.
The Impact of CVE-2019-9160
Exploiting this vulnerability enables attackers to gain root privileges by utilizing the WebUI admin password combined with a fixed string, compromising system security.
Technical Details of CVE-2019-9160
The technical aspects of the CVE-2019-9160 vulnerability are as follows:
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your system from CVE-2019-9160 with the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates