CVE-2020-3281

A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:digital_network_architecture_center:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 - Patch, Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 - Patch, Vendor Advisory

Information

Published : 2020-06-03 18:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3281

Mitre link : CVE-2020-3281

CVE.ORG link : CVE-2020-3281


JSON object : View

Products Affected

cisco

  • digital_network_architecture_center
CWE
CWE-532

Insertion of Sensitive Information into Log File