First published: Tue May 05 2020(Updated: )
1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.
Credit: sirt@silver-peak.com sirt@silver-peak.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silver-peak Unity Edgeconnect For Amazon Web Services | ||
Silver-peak Unity Edgeconnect For Azure | ||
Silver-peak Unity Edgeconnect For Google Cloud Platform | ||
Silver-peak Unity Orchestrator | <8.9.2 | |
Silver-peak Vx-500 Firmware | ||
Silver-peak Vx-500 | ||
Silver-peak Vx-1000 Firmware | ||
Silver-peak Vx-1000 | ||
Silver-peak Vx-2000 Firmware | ||
Silver-peak Vx-2000 | ||
Silver-peak Vx-3000 Firmware | ||
Silver-peak Vx-3000 | ||
Silver-peak Vx-5000 Firmware | ||
Silver-peak Vx-5000 | ||
Silver-peak Vx-6000 Firmware | ||
Silver-peak Vx-6000 | ||
Silver-peak Vx-7000 Firmware | ||
Silver-peak Vx-7000 | ||
Silver-peak Vx-9000 Firmware | ||
Silver-peak Vx-9000 | ||
Silver-peak Vx-8000 Firmware | ||
Silver-peak Vx-8000 | ||
Silver-peak Nx-700 Firmware | ||
Silver-peak Nx-700 | ||
Silver-peak Nx-1000 Firmware | ||
Silver-peak Nx-1000 | ||
Silver-peak Nx-2000 Firmware | ||
Silver-peak Nx-2000 | ||
Silver-peak Nx-3000 Firmware | ||
Silver-peak Nx-3000 | ||
Silver-peak Nx-5000 Firmware | ||
Silver-peak Nx-5000 | ||
Silver-peak Nx-6000 Firmware | ||
Silver-peak Nx-6000 | ||
Silver-peak Nx-7000 Firmware | ||
Silver-peak Nx-7000 | ||
Silver-peak Nx-8000 Firmware | ||
Silver-peak Nx-8000 | ||
Silver-peak Nx-9000 Firmware | ||
Silver-peak Nx-9000 | ||
Silver-peak Nx-10k Firmware | ||
Silver-peak Nx-10k | ||
Silver-peak Nx-11k Firmware | ||
Silver-peak Nx-11k | ||
Arubanetworks Vx-500 | ||
Arubanetworks Vx-1000 | ||
Arubanetworks Vx-2000 | ||
Arubanetworks Vx-3000 | ||
Arubanetworks Vx-5000 | ||
Arubanetworks Vx-6000 | ||
Arubanetworks Vx-7000 | ||
Arubanetworks Vx-9000 | ||
Arubanetworks Vx-8000 | ||
Arubanetworks Nx-700 | ||
Arubanetworks Nx-1000 | ||
Arubanetworks Nx-2000 | ||
Arubanetworks Nx-3000 | ||
Arubanetworks Nx-5000 | ||
Arubanetworks Nx-6000 | ||
Arubanetworks Nx-7000 | ||
Arubanetworks Nx-8000 | ||
Arubanetworks Nx-9000 | ||
Arubanetworks Nx-10k | ||
Arubanetworks Nx-11k |
https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material_cve_2020_12142.pdf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12142 is medium, with a severity value of 4.9.
A user with admin credentials and the required system knowledge can retrieve IPSec UDP key material from machine-to-machine interfaces and human-accessible interfaces.
An attacker with the IPSec UDP key material can decrypt in-flight communication.
Silver-peak Unity Edgeconnect for Amazon Web Services, Silver-peak Unity Edgeconnect for Azure, Silver-peak Unity Edgeconnect for Google Cloud Platform, Silver-peak Unity Orchestrator, and Silver-peak Vx-500 Firmware are affected by CVE-2020-12142.
There is currently no known fix for CVE-2020-12142. It is recommended to follow the recommendations provided by the vendor.