CWE
668
Advisory Published
Updated

CVE-2020-12142: IPSec UDP key material can be retrieved from EdgeConnect by a user with admin credentials

First published: Tue May 05 2020(Updated: )

1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.

Credit: sirt@silver-peak.com sirt@silver-peak.com

Affected SoftwareAffected VersionHow to fix
Silver-peak Unity Edgeconnect For Amazon Web Services
Silver-peak Unity Edgeconnect For Azure
Silver-peak Unity Edgeconnect For Google Cloud Platform
Silver-peak Unity Orchestrator<8.9.2
Silver-peak Vx-500 Firmware
Silver-peak Vx-500
Silver-peak Vx-1000 Firmware
Silver-peak Vx-1000
Silver-peak Vx-2000 Firmware
Silver-peak Vx-2000
Silver-peak Vx-3000 Firmware
Silver-peak Vx-3000
Silver-peak Vx-5000 Firmware
Silver-peak Vx-5000
Silver-peak Vx-6000 Firmware
Silver-peak Vx-6000
Silver-peak Vx-7000 Firmware
Silver-peak Vx-7000
Silver-peak Vx-9000 Firmware
Silver-peak Vx-9000
Silver-peak Vx-8000 Firmware
Silver-peak Vx-8000
Silver-peak Nx-700 Firmware
Silver-peak Nx-700
Silver-peak Nx-1000 Firmware
Silver-peak Nx-1000
Silver-peak Nx-2000 Firmware
Silver-peak Nx-2000
Silver-peak Nx-3000 Firmware
Silver-peak Nx-3000
Silver-peak Nx-5000 Firmware
Silver-peak Nx-5000
Silver-peak Nx-6000 Firmware
Silver-peak Nx-6000
Silver-peak Nx-7000 Firmware
Silver-peak Nx-7000
Silver-peak Nx-8000 Firmware
Silver-peak Nx-8000
Silver-peak Nx-9000 Firmware
Silver-peak Nx-9000
Silver-peak Nx-10k Firmware
Silver-peak Nx-10k
Silver-peak Nx-11k Firmware
Silver-peak Nx-11k
Arubanetworks Vx-500
Arubanetworks Vx-1000
Arubanetworks Vx-2000
Arubanetworks Vx-3000
Arubanetworks Vx-5000
Arubanetworks Vx-6000
Arubanetworks Vx-7000
Arubanetworks Vx-9000
Arubanetworks Vx-8000
Arubanetworks Nx-700
Arubanetworks Nx-1000
Arubanetworks Nx-2000
Arubanetworks Nx-3000
Arubanetworks Nx-5000
Arubanetworks Nx-6000
Arubanetworks Nx-7000
Arubanetworks Nx-8000
Arubanetworks Nx-9000
Arubanetworks Nx-10k
Arubanetworks Nx-11k

Remedy

https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material_cve_2020_12142.pdf

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-12142?

    The severity of CVE-2020-12142 is medium, with a severity value of 4.9.

  • How can a user retrieve IPSec UDP key material from machine-to-machine interfaces and human-accessible interfaces?

    A user with admin credentials and the required system knowledge can retrieve IPSec UDP key material from machine-to-machine interfaces and human-accessible interfaces.

  • What can an attacker do with the retrieved IPSec UDP key material in CVE-2020-12142?

    An attacker with the IPSec UDP key material can decrypt in-flight communication.

  • Which Silver-peak products are affected by CVE-2020-12142?

    Silver-peak Unity Edgeconnect for Amazon Web Services, Silver-peak Unity Edgeconnect for Azure, Silver-peak Unity Edgeconnect for Google Cloud Platform, Silver-peak Unity Orchestrator, and Silver-peak Vx-500 Firmware are affected by CVE-2020-12142.

  • How can I fix CVE-2020-12142?

    There is currently no known fix for CVE-2020-12142. It is recommended to follow the recommendations provided by the vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203