CVE-2020-3483

Duo has identified and fixed an issue with the Duo Network Gateway (DNG) product in which some customer-provided SSL certificates and private keys were not excluded from logging. This issue resulted in certificate and private key information being written out in plain-text to local files on the DNG host. Any private keys logged in this way could be viewed by those with access to the DNG host operating system without any need for reversing encrypted values or similar techniques. An attacker that gained access to the DNG logs and with the ability to intercept and manipulate network traffic between a user and the DNG, could decrypt and manipulate SSL/TLS connections to the DNG and to the protected applications behind it. Duo Network Gateway (DNG) versions 1.3.3 through 1.5.7 are affected.
References
Link Resource
https://duo.com/labs/psa/duo-psa-2020-004 Patch Vendor Advisory
https://duo.com/labs/psa/duo-psa-2020-004 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:duo_network_gateway:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:31

Type Values Removed Values Added
References () https://duo.com/labs/psa/duo-psa-2020-004 - Patch, Vendor Advisory () https://duo.com/labs/psa/duo-psa-2020-004 - Patch, Vendor Advisory
CVSS v2 : 3.3
v3 : 6.3
v2 : 3.3
v3 : 7.1

Information

Published : 2020-10-14 19:15

Updated : 2024-11-21 05:31


NVD link : CVE-2020-3483

Mitre link : CVE-2020-3483

CVE.ORG link : CVE-2020-3483


JSON object : View

Products Affected

cisco

  • duo_network_gateway
CWE
CWE-256

Plaintext Storage of a Password

CWE-522

Insufficiently Protected Credentials