A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.
References
Configurations
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422 - Vendor Advisory | |
References | () https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/ - Exploit, Third Party Advisory |
Information
Published : 2022-06-22 14:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20651
Mitre link : CVE-2022-20651
CVE.ORG link : CVE-2022-20651
JSON object : View
Products Affected
cisco
- adaptive_security_device_manager
CWE
CWE-532
Insertion of Sensitive Information into Log File