First published: Thu Feb 23 2023(Updated: )
A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Central | <4.2\(3c\) | |
Cisco UCS 6536 Firmware | ||
Cisco UCS 6536 Firmware | ||
Cisco UCS 64108 Firmware | ||
Cisco UCS 64108 firmware | ||
Cisco UCS 6454 Firmware | ||
Cisco UCS 6454 Fabric Interconnect | ||
Cisco UCS 6200 Firmware | ||
Cisco UCS 6200 firmware | ||
Cisco UCS 6248UP Firmware | ||
Cisco UCS 6248UP Firmware | ||
Cisco UCS 6296UP Firmware | ||
Cisco UCS 6296UP Firmware | ||
Cisco UCS 6300 firmware | ||
Cisco UCS 6300 firmware | ||
Cisco UCS 6324 Firmware | ||
Cisco UCS 6324 Firmware | ||
Cisco UCS 6332 Fabric Interconnect firmware | ||
Cisco UCS 6332 | ||
Cisco UCS 6332-16up Fabric Interconnect firmware | ||
Cisco UCS 6332-16UP Fabric Interconnect firmware | ||
Cisco FX-OS | <2.6.1 | |
Cisco Firepower 4100 Series | ||
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4112 Firmware | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4125 firmware | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4145 firmware | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 | ||
Cisco Firepower 9300 SM-56 X 3 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-20016.
CVE-2023-20016 has a severity level of medium (6.5).
Cisco UCS Manager Software and Cisco FXOS Software are affected by CVE-2023-20016.
An unauthenticated attacker with access to a backup file can exploit CVE-2023-20016 to decrypt sensitive information stored in the full state and configuration backup file.
You can find more information about CVE-2023-20016 in the Cisco Security Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-bkpsky-H8FCQgsA