6.5
CVSSv3

CVE-2023-20016

Published: 23/02/2023 Updated: 07/11/2023
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 0

Vulnerability Summary

A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the malicious user to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ucs_central_software

cisco ucs_6536_firmware -

cisco ucs_64108_firmware -

cisco ucs_6454_firmware -

cisco ucs_6200_firmware -

cisco ucs_6248up_firmware -

cisco ucs_6296up_firmware -

cisco ucs_6300_firmware -

cisco ucs_6324_firmware -

cisco ucs_6332_firmware -

cisco ucs_6332-16up_firmware -

cisco fxos

Vendor Advisories

A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files This vulnerability is due to a weakness in the ...

Github Repositories

Decrypt Cisco UCS configuration files

Decrypting Cisco UCS backups During a penetration test I came across backup files from UCS Manager that had an encryption scheme for the passwords that I hadn't seen before: <commSnmpUser auth="sha" descr="" name="snmp-user" privpwd="SwfZz8P8VM2i6hiJWn9A7A==" pwd="SwfZz8P8VM2i6hiJWn9A7A==" useAes="