A vulnerability in Cisco Intelligent Node (iNode) Software could allow an unauthenticated, remote attacker to hijack the TLS connection between Cisco iNode Manager and associated intelligent nodes and send arbitrary traffic to an affected device.
This vulnerability is due to the presence of hard-coded cryptographic material. An attacker in a man-in-the-middle position between Cisco iNode Manager and associated deployed nodes could exploit this vulnerability by using the static cryptographic key to generate a trusted certificate and impersonate an affected device. A successful exploit could allow the attacker to read data that is meant for a legitimate device, modify the startup configuration of an associated node, and, consequently, cause a denial of service (DoS) condition for downstream devices that are connected to the affected node.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-07-17T16:28:39.858Z
Updated: 2024-08-01T21:59:41.478Z
Reserved: 2023-11-08T15:08:07.640Z
Link: CVE-2024-20323
Vulnrichment
Updated: 2024-08-01T21:59:41.478Z
NVD
Status : Awaiting Analysis
Published: 2024-07-17T17:15:12.607
Modified: 2024-07-18T12:28:43.707
Link: CVE-2024-20323
Redhat
No data.