CVE-2023-20016

moderate-risk
Published 2023-02-23

A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.

Do I need to act?

-
0.21% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.3/10 Medium
LOCAL / LOW complexity

Affected Products (12)

Ucs 6536 Firmware
Ucs 64108 Firmware
Ucs 6454 Firmware
Ucs 6200 Firmware
Ucs 6248Up Firmware
Ucs 6296Up Firmware
Ucs 6300 Firmware
Ucs 6324 Firmware
Ucs 6332 Firmware
Ucs 6332-16Up Firmware
Fxos

Affected Vendors

38
/ 100
moderate-risk
Severity 20/34 · Moderate
Exploitability 1/34 · Minimal
Exposure 17/34 · Moderate