6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
31.8%
A vulnerability in the logging component of Cisco Duo Authentication Proxy could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.
This vulnerability exists because certain unencrypted credentials are stored. An attacker could exploit this vulnerability by accessing the logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to view sensitive information in clear text.
[
{
"vendor": "Cisco",
"product": "Cisco Duo Authentication Proxy",
"versions": [
{
"version": "2.10.0",
"status": "affected"
},
{
"version": "2.10.1",
"status": "affected"
},
{
"version": "2.11.0",
"status": "affected"
},
{
"version": "2.12.0",
"status": "affected"
},
{
"version": "2.12.1",
"status": "affected"
},
{
"version": "2.13.0",
"status": "affected"
},
{
"version": "2.14.0",
"status": "affected"
},
{
"version": "2.4.10",
"status": "affected"
},
{
"version": "2.4.11",
"status": "affected"
},
{
"version": "2.4.12",
"status": "affected"
},
{
"version": "2.4.13",
"status": "affected"
},
{
"version": "2.4.14",
"status": "affected"
},
{
"version": "2.4.14.1",
"status": "affected"
},
{
"version": "2.4.15",
"status": "affected"
},
{
"version": "2.4.16",
"status": "affected"
},
{
"version": "2.4.17",
"status": "affected"
},
{
"version": "2.4.18",
"status": "affected"
},
{
"version": "2.4.19",
"status": "affected"
},
{
"version": "2.4.2",
"status": "affected"
},
{
"version": "2.4.20",
"status": "affected"
},
{
"version": "2.4.21",
"status": "affected"
},
{
"version": "2.4.3",
"status": "affected"
},
{
"version": "2.4.4",
"status": "affected"
},
{
"version": "2.4.5",
"status": "affected"
},
{
"version": "2.4.6",
"status": "affected"
},
{
"version": "2.4.7",
"status": "affected"
},
{
"version": "2.4.8",
"status": "affected"
},
{
"version": "2.4.9",
"status": "affected"
},
{
"version": "2.5.4",
"status": "affected"
},
{
"version": "2.6.0",
"status": "affected"
},
{
"version": "2.7.0",
"status": "affected"
},
{
"version": "2.8.1",
"status": "affected"
},
{
"version": "2.9.0",
"status": "affected"
},
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.1",
"status": "affected"
},
{
"version": "3.2.0",
"status": "affected"
},
{
"version": "3.2.1",
"status": "affected"
},
{
"version": "3.2.2",
"status": "affected"
},
{
"version": "3.2.3",
"status": "affected"
},
{
"version": "3.2.4",
"status": "affected"
},
{
"version": "4.0.0",
"status": "affected"
},
{
"version": "4.0.1",
"status": "affected"
},
{
"version": "4.0.2",
"status": "affected"
},
{
"version": "5.0.0",
"status": "affected"
},
{
"version": "5.0.1",
"status": "affected"
},
{
"version": "5.0.2",
"status": "affected"
},
{
"version": "5.1.0",
"status": "affected"
},
{
"version": "5.1.1",
"status": "affected"
},
{
"version": "5.2.0",
"status": "affected"
},
{
"version": "5.2.1",
"status": "affected"
},
{
"version": "5.2.2",
"status": "affected"
},
{
"version": "5.3.0",
"status": "affected"
},
{
"version": "5.3.1",
"status": "affected"
},
{
"version": "5.4.0",
"status": "affected"
},
{
"version": "5.4.1",
"status": "affected"
},
{
"version": "5.5.0",
"status": "affected"
},
{
"version": "5.5.1",
"status": "affected"
},
{
"version": "5.6.0",
"status": "affected"
},
{
"version": "5.6.1",
"status": "affected"
}
]
}
]
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
31.8%