Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-20016 |
CWE-ID | CWE-320 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Cisco UCS Manager Client/Desktop applications / Software for system administration Firepower 4100 Series Security Appliances Hardware solutions / Routers & switches, VoIP, GSM, etc UCS 6200 Series Fabric Interconnects Hardware solutions / Routers & switches, VoIP, GSM, etc UCS 6300 Series Fabric Interconnects Hardware solutions / Routers & switches, VoIP, GSM, etc UCS 6400 Series Fabric Interconnects Hardware solutions / Routers & switches, VoIP, GSM, etc UCS 6500 Series Fabric Interconnects Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Firepower 9300 Security Appliance Hardware solutions / Security hardware applicances Cisco FXOS Operating systems & Components / Operating system |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU72513
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-20016
CWE-ID:
CWE-320 - Key Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to a weakness in the encryption method used for the backup function. A local attacker can decrypt sensitive information that is stored in full state and configuration backup files.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco UCS Manager: 4.0 - 4.2
Firepower 4100 Series Security Appliances: All versions
Cisco Firepower 9300 Security Appliance: All versions
UCS 6200 Series Fabric Interconnects: All versions
UCS 6300 Series Fabric Interconnects: All versions
UCS 6400 Series Fabric Interconnects: All versions
UCS 6500 Series Fabric Interconnects: All versions
Cisco FXOS: before 2.6.1
CPE2.3https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-bkpsky-H8FCQgsA
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.