First published: Wed Jun 22 2022(Updated: )
A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Device Manager | >=7.15.1<7.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20651 is a vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) that could allow an authenticated, local attacker to view sensitive information in clear text on an affected system.
CVE-2022-20651 affects Cisco ASDM by allowing an authenticated, local attacker to view sensitive information in clear text on the affected system.
The severity of CVE-2022-20651 is medium with a severity value of 5.5 (out of 10).
CVE-2022-20651 can be exploited by an authenticated, local attacker in a shared workstation environment where Cisco ASDM is deployed.
Yes, Cisco has released a software update to address CVE-2022-20651. Users should update to Cisco ASDM version 7.17.1 or later to mitigate the vulnerability.