CVE-2020-11878
moderate-risk
Published 2020-04-17
The Jitsi Meet (aka docker-jitsi-meet) stack on Docker before stable-4384-1 uses default passwords (such as passw0rd) for system accounts.
Do I need to act?
-
0.36% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: a4274840e1e158950a6b86f0ff92368434d67fc2
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://github.com/jitsi/docker-jitsi-meet/compare/stable-4384...stable-4384-1
Third Party Advisory
https://github.com/jitsi/docker-jitsi-meet/compare/stable-4384...stable-4384-1
38
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal