CVE-2009-3548

EUVD-2009-3530
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
apachetomcat
3.0
apachetomcat
3.1
apachetomcat
3.1.1
apachetomcat
3.2
apachetomcat
3.2.1
apachetomcat
3.2.2
apachetomcat
3.2.2:beta2
apachetomcat
3.2.3
apachetomcat
3.2.4
apachetomcat
3.3
apachetomcat
3.3.1
apachetomcat
3.3.1a:a
apachetomcat
3.3.2
apachetomcat
4.0.0
apachetomcat
4.0.1
apachetomcat
4.0.2
apachetomcat
4.0.3
apachetomcat
4.0.4
apachetomcat
4.0.5
apachetomcat
4.0.6
apachetomcat
4.1.0
apachetomcat
4.1.1
apachetomcat
4.1.2
apachetomcat
4.1.3
apachetomcat
4.1.3:beta
apachetomcat
4.1.4
apachetomcat
4.1.5
apachetomcat
4.1.6
apachetomcat
4.1.7
apachetomcat
4.1.8
apachetomcat
4.1.9
apachetomcat
4.1.9:beta
apachetomcat
4.1.10
apachetomcat
4.1.11
apachetomcat
4.1.12
apachetomcat
4.1.13
apachetomcat
4.1.14
apachetomcat
4.1.15
apachetomcat
4.1.16
apachetomcat
4.1.17
apachetomcat
4.1.18
apachetomcat
4.1.19
apachetomcat
4.1.20
apachetomcat
4.1.21
apachetomcat
4.1.22
apachetomcat
4.1.23
apachetomcat
4.1.24
apachetomcat
4.1.25
apachetomcat
4.1.26
apachetomcat
4.1.27
apachetomcat
4.1.28
apachetomcat
4.1.29
apachetomcat
4.1.30
apachetomcat
4.1.31
apachetomcat
4.1.32
apachetomcat
4.1.33
apachetomcat
4.1.34
apachetomcat
4.1.35
apachetomcat
4.1.36
apachetomcat
4.1.37
apachetomcat
4.1.38
apachetomcat
4.1.39
apachetomcat
5.0.0
apachetomcat
5.0.1
apachetomcat
5.0.2
apachetomcat
5.0.3
apachetomcat
5.0.4
apachetomcat
5.0.5
apachetomcat
5.0.6
apachetomcat
5.0.7
apachetomcat
5.0.8
apachetomcat
5.0.9
apachetomcat
5.0.10
apachetomcat
5.0.11
apachetomcat
5.0.12
apachetomcat
5.0.13
apachetomcat
5.0.14
apachetomcat
5.0.15
apachetomcat
5.0.16
apachetomcat
5.0.17
apachetomcat
5.0.18
apachetomcat
5.0.19
apachetomcat
5.0.21
apachetomcat
5.0.22
apachetomcat
5.0.23
apachetomcat
5.0.24
apachetomcat
5.0.25
apachetomcat
5.0.26
apachetomcat
5.0.27
apachetomcat
5.0.28
apachetomcat
5.0.29
apachetomcat
5.0.30
apachetomcat
5.5.0
apachetomcat
5.5.1
apachetomcat
5.5.2
apachetomcat
5.5.3
apachetomcat
5.5.4
apachetomcat
5.5.5
apachetomcat
5.5.6
apachetomcat
5.5.7
apachetomcat
5.5.8
apachetomcat
5.5.9
apachetomcat
5.5.10
apachetomcat
5.5.11
apachetomcat
5.5.12
apachetomcat
5.5.13
apachetomcat
5.5.14
apachetomcat
5.5.15
apachetomcat
5.5.16
apachetomcat
5.5.17
apachetomcat
5.5.18
apachetomcat
5.5.19
apachetomcat
5.5.20
apachetomcat
5.5.21
apachetomcat
5.5.22
apachetomcat
5.5.23
apachetomcat
5.5.24
apachetomcat
5.5.25
apachetomcat
5.5.26
apachetomcat
5.5.27
apachetomcat
5.5.28
apachetomcat
6.0
apachetomcat
6.0.0
apachetomcat
6.0.1
apachetomcat
6.0.2
apachetomcat
6.0.3
apachetomcat
6.0.4
apachetomcat
6.0.5
apachetomcat
6.0.6
apachetomcat
6.0.7
apachetomcat
6.0.8
apachetomcat
6.0.9
apachetomcat
6.0.10
apachetomcat
6.0.11
apachetomcat
6.0.12
apachetomcat
6.0.13
apachetomcat
6.0.14
apachetomcat
6.0.15
apachetomcat
6.0.16
apachetomcat
6.0.17
apachetomcat
6.0.18
apachetomcat
6.0.20
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References