A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.

Project Subscriptions

Vendors Products
Firepower 4100 Subscribe
Firepower 4110 Subscribe
Firepower 4112 Subscribe
Firepower 4115 Subscribe
Firepower 4120 Subscribe
Firepower 4125 Subscribe
Firepower 4140 Subscribe
Firepower 4145 Subscribe
Firepower 4150 Subscribe
Firepower 9300 Sm-24 Subscribe
Firepower 9300 Sm-36 Subscribe
Firepower 9300 Sm-40 Subscribe
Firepower 9300 Sm-44 Subscribe
Firepower 9300 Sm-44 X 3 Subscribe
Firepower 9300 Sm-48 Subscribe
Firepower 9300 Sm-56 Subscribe
Firepower 9300 Sm-56 X 3 Subscribe
Ucs 6200 Subscribe
Ucs 6200 Firmware Subscribe
Ucs 6248up Subscribe
Ucs 6248up Firmware Subscribe
Ucs 6296up Subscribe
Ucs 6296up Firmware Subscribe
Ucs 6300 Subscribe
Ucs 6300 Firmware Subscribe
Ucs 6324 Subscribe
Ucs 6324 Firmware Subscribe
Ucs 6332 Subscribe
Ucs 6332-16up Subscribe
Ucs 6332-16up Firmware Subscribe
Ucs 6332 Firmware Subscribe
Ucs 64108 Subscribe
Ucs 64108 Firmware Subscribe
Ucs 6454 Subscribe
Ucs 6454 Firmware Subscribe
Ucs 6536 Subscribe
Ucs 6536 Firmware Subscribe
Ucs Central Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24195 A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-25T16:04:01.210Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20016

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.614Z

cve-icon NVD

Status : Modified

Published: 2023-02-23T20:15:13.407

Modified: 2024-11-21T07:40:20.983

Link: CVE-2023-20016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses