CVE-2022-20651

A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:adaptive_security_device_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422 - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422 - Vendor Advisory
References () https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/ - Exploit, Third Party Advisory () https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/ - Exploit, Third Party Advisory

Information

Published : 2022-06-22 14:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20651

Mitre link : CVE-2022-20651

CVE.ORG link : CVE-2022-20651


JSON object : View

Products Affected

cisco

  • adaptive_security_device_manager
CWE
CWE-532

Insertion of Sensitive Information into Log File