1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4457 | 1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell. |
Fixes
Solution
https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material_cve_2020_12142.pdf
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Silver Peak
Published:
Updated: 2024-08-04T11:48:58.551Z
Reserved: 2020-04-24T00:00:00
Link: CVE-2020-12142
No data.
Status : Modified
Published: 2020-05-05T20:15:12.057
Modified: 2024-11-21T04:59:20.767
Link: CVE-2020-12142
No data.
OpenCVE Enrichment
No data.
EUVD