A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 | Patch Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 - Patch, Vendor Advisory |
Information
Published : 2020-06-03 18:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3281
Mitre link : CVE-2020-3281
CVE.ORG link : CVE-2020-3281
JSON object : View
Products Affected
cisco
- digital_network_architecture_center
CWE
CWE-532
Insertion of Sensitive Information into Log File