CVE-2020-4429

CRITICAL EXPLOITED NUCLEI

IBM Data Risk Manager - Hard-coded Credentials

Title source: rule

Description

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 contains a default password for an IDRM administrative account. A remote attacker could exploit this vulnerability to login and execute arbitrary code on the system with root privileges. IBM X-Force ID: 180534.

Exploits (4)

github WORKING POC 4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2020/CVE-2020-4429.md
metasploit WORKING POC EXCELLENT
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ibm_drm_rce.rb
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/ibm_drm_download.rb
metasploit WORKING POC EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/ibm_drm_a3user.rb

Nuclei Templates (1)

IBM Data Risk Manager - Hardcoded Credentials
CRITICALby Kazgangap

Scores

CVSS v3 9.8
EPSS 0.9070
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-08-12
CWE
CWE-798
Status published
Products (6)
ibm/data_risk_manager 2.0.1
ibm/data_risk_manager 2.0.2
ibm/data_risk_manager 2.0.3
ibm/data_risk_manager 2.0.4
ibm/data_risk_manager 2.0.5
ibm/data_risk_manager 2.0.6
Published May 07, 2020
Tracked Since Feb 18, 2026