First published: Wed Jun 03 2020(Updated: )
A vulnerability in the key store of Cisco Application Services Engine Software could allow an authenticated, local attacker to read sensitive information of other users on an affected device. The vulnerability is due to insufficient authorization limitations. An attacker could exploit this vulnerability by logging in to an affected device locally with valid credentials. A successful exploit could allow the attacker to read the sensitive information of other users on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller | =1.1\(0c\) | |
Cisco Application Services Engine | <1.1.2.20 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3335 is a vulnerability in the key store of Cisco Application Services Engine Software that allows an attacker to read sensitive information of other users on an affected device.
CVE-2020-3335 has a severity level of 5.5, which is considered medium.
Cisco Application Policy Infrastructure Controller version 1.1(0c), as well as Cisco Application Services Engine up to version 1.1.2.20, are affected by CVE-2020-3335.
An authenticated, local attacker could exploit CVE-2020-3335 to read sensitive information of other users on the affected device.
More information about CVE-2020-3335 can be found in the Cisco Security Advisory at the following link: [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4)