Lucene search

K
cve[email protected]CVE-2023-20207
HistoryJul 12, 2023 - 2:15 p.m.

CVE-2023-20207

2023-07-1214:15:09
CWE-532
CWE-312
web.nvd.nist.gov
12
cve-2023-20207
vulnerability
cisco
duo
authentication proxy
logging
sensitive information
clear text
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%

A vulnerability in the logging component of Cisco Duo Authentication Proxy could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.

This vulnerability exists because certain unencrypted credentials are stored. An attacker could exploit this vulnerability by accessing the logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to view sensitive information in clear text.

Affected configurations

NVD
Node
duoauthentication_proxyMatch5.8.1
OR
duoauthentication_proxyMatch6.0.0

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Duo Authentication Proxy",
    "versions": [
      {
        "version": "2.10.0",
        "status": "affected"
      },
      {
        "version": "2.10.1",
        "status": "affected"
      },
      {
        "version": "2.11.0",
        "status": "affected"
      },
      {
        "version": "2.12.0",
        "status": "affected"
      },
      {
        "version": "2.12.1",
        "status": "affected"
      },
      {
        "version": "2.13.0",
        "status": "affected"
      },
      {
        "version": "2.14.0",
        "status": "affected"
      },
      {
        "version": "2.4.10",
        "status": "affected"
      },
      {
        "version": "2.4.11",
        "status": "affected"
      },
      {
        "version": "2.4.12",
        "status": "affected"
      },
      {
        "version": "2.4.13",
        "status": "affected"
      },
      {
        "version": "2.4.14",
        "status": "affected"
      },
      {
        "version": "2.4.14.1",
        "status": "affected"
      },
      {
        "version": "2.4.15",
        "status": "affected"
      },
      {
        "version": "2.4.16",
        "status": "affected"
      },
      {
        "version": "2.4.17",
        "status": "affected"
      },
      {
        "version": "2.4.18",
        "status": "affected"
      },
      {
        "version": "2.4.19",
        "status": "affected"
      },
      {
        "version": "2.4.2",
        "status": "affected"
      },
      {
        "version": "2.4.20",
        "status": "affected"
      },
      {
        "version": "2.4.21",
        "status": "affected"
      },
      {
        "version": "2.4.3",
        "status": "affected"
      },
      {
        "version": "2.4.4",
        "status": "affected"
      },
      {
        "version": "2.4.5",
        "status": "affected"
      },
      {
        "version": "2.4.6",
        "status": "affected"
      },
      {
        "version": "2.4.7",
        "status": "affected"
      },
      {
        "version": "2.4.8",
        "status": "affected"
      },
      {
        "version": "2.4.9",
        "status": "affected"
      },
      {
        "version": "2.5.4",
        "status": "affected"
      },
      {
        "version": "2.6.0",
        "status": "affected"
      },
      {
        "version": "2.7.0",
        "status": "affected"
      },
      {
        "version": "2.8.1",
        "status": "affected"
      },
      {
        "version": "2.9.0",
        "status": "affected"
      },
      {
        "version": "3.0.0",
        "status": "affected"
      },
      {
        "version": "3.1.0",
        "status": "affected"
      },
      {
        "version": "3.1.1",
        "status": "affected"
      },
      {
        "version": "3.2.0",
        "status": "affected"
      },
      {
        "version": "3.2.1",
        "status": "affected"
      },
      {
        "version": "3.2.2",
        "status": "affected"
      },
      {
        "version": "3.2.3",
        "status": "affected"
      },
      {
        "version": "3.2.4",
        "status": "affected"
      },
      {
        "version": "4.0.0",
        "status": "affected"
      },
      {
        "version": "4.0.1",
        "status": "affected"
      },
      {
        "version": "4.0.2",
        "status": "affected"
      },
      {
        "version": "5.0.0",
        "status": "affected"
      },
      {
        "version": "5.0.1",
        "status": "affected"
      },
      {
        "version": "5.0.2",
        "status": "affected"
      },
      {
        "version": "5.1.0",
        "status": "affected"
      },
      {
        "version": "5.1.1",
        "status": "affected"
      },
      {
        "version": "5.2.0",
        "status": "affected"
      },
      {
        "version": "5.2.1",
        "status": "affected"
      },
      {
        "version": "5.2.2",
        "status": "affected"
      },
      {
        "version": "5.3.0",
        "status": "affected"
      },
      {
        "version": "5.3.1",
        "status": "affected"
      },
      {
        "version": "5.4.0",
        "status": "affected"
      },
      {
        "version": "5.4.1",
        "status": "affected"
      },
      {
        "version": "5.5.0",
        "status": "affected"
      },
      {
        "version": "5.5.1",
        "status": "affected"
      },
      {
        "version": "5.6.0",
        "status": "affected"
      },
      {
        "version": "5.6.1",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%

Related for CVE-2023-20207