CVE-2017-20234
Authentication Bypass in GarrettCom Magnum Switches Enables Unauthorized Access
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| garrettcom | magnum_6k | * |
| garrettcom | magnum_10k | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in GarrettCom Magnum 6K and 10K managed switches is an authentication bypass issue. It allows unauthenticated attackers to gain unauthorized access by exploiting a hardcoded string in the authentication mechanism. This means attackers can bypass login controls and access administrative functions and sensitive switch configurations without needing valid credentials.
How can this vulnerability impact me? :
This vulnerability can have a severe impact as it allows attackers to gain administrative access to the affected switches without authentication. This unauthorized access can lead to manipulation of switch configurations, potential disruption of network operations, exposure of sensitive network information, and overall compromise of network security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to bypass authentication and gain unauthorized administrative access to GarrettCom Magnum 6K and 10K managed switches. This unauthorized access to sensitive switch configuration and administrative functions could lead to exposure or manipulation of sensitive data, which may impact compliance with standards and regulations such as GDPR and HIPAA that require protection of sensitive information and strict access controls.
However, specific impacts on compliance with these standards are not detailed in the provided information.