CWE
330 321
Advisory Published
Updated

CVE-2023-20016: Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability

First published: Thu Feb 23 2023(Updated: )

A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco UCS Central<4.2\(3c\)
Cisco UCS 6536 Firmware
Cisco UCS 6536 Firmware
Cisco UCS 64108 Firmware
Cisco UCS 64108 firmware
Cisco UCS 6454 Firmware
Cisco UCS 6454 Fabric Interconnect
Cisco UCS 6200 Firmware
Cisco UCS 6200 firmware
Cisco UCS 6248UP Firmware
Cisco UCS 6248UP Firmware
Cisco UCS 6296UP Firmware
Cisco UCS 6296UP Firmware
Cisco UCS 6300 firmware
Cisco UCS 6300 firmware
Cisco UCS 6324 Firmware
Cisco UCS 6324 Firmware
Cisco UCS 6332 Fabric Interconnect firmware
Cisco UCS 6332
Cisco UCS 6332-16up Fabric Interconnect firmware
Cisco UCS 6332-16UP Fabric Interconnect firmware
Cisco FX-OS<2.6.1
Cisco Firepower 4100 Series
Cisco Firepower 4110 Next-Generation Firewall
Cisco Firepower 4112 Firmware
Cisco Firepower 4115
Cisco Firepower 4120 Next-Generation Firewall
Cisco Firepower 4125 firmware
Cisco Firepower 4140 Next-Generation Firewall
Cisco Firepower 4145 firmware
Cisco Firepower 4150 Next-Generation Firewall
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300
Cisco Firepower 9300 SM-56 X 3 firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2023-20016.

  • What is the severity level of CVE-2023-20016?

    CVE-2023-20016 has a severity level of medium (6.5).

  • What software is affected by CVE-2023-20016?

    Cisco UCS Manager Software and Cisco FXOS Software are affected by CVE-2023-20016.

  • How can an unauthenticated attacker exploit CVE-2023-20016?

    An unauthenticated attacker with access to a backup file can exploit CVE-2023-20016 to decrypt sensitive information stored in the full state and configuration backup file.

  • Where can I find more information about CVE-2023-20016?

    You can find more information about CVE-2023-20016 in the Cisco Security Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-bkpsky-H8FCQgsA

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203