CWE
330 321
Advisory Published
Updated

CVE-2023-20016: Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability

First published: Thu Feb 23 2023(Updated: )

A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Ucs Central Software<4.2\(3c\)
Cisco Ucs 6536 Firmware
Cisco Ucs 6536
Cisco Ucs 64108 Firmware
Cisco Ucs 64108
Cisco Ucs 6454 Firmware
Cisco Ucs 6454
Cisco Ucs 6200 Firmware
Cisco UCS 6200
Cisco Ucs 6248up Firmware
Cisco Ucs 6248up
Cisco Ucs 6296up Firmware
Cisco Ucs 6296up
Cisco Ucs 6300 Firmware
Cisco Ucs 6300
Cisco Ucs 6324 Firmware
Cisco Ucs 6324
Cisco Ucs 6332 Firmware
Cisco Ucs 6332
Cisco Ucs 6332-16up Firmware
Cisco Ucs 6332-16up
Cisco FXOS<2.6.1
Cisco Firepower 4100
Cisco Firepower 4110
Cisco Firepower 4112
Cisco Firepower 4115
Cisco Firepower 4120
Cisco Firepower 4125
Cisco Firepower 4140
Cisco Firepower 4145
Cisco Firepower 4150
Cisco Firepower 9300 Sm-24
Cisco Firepower 9300 Sm-36
Cisco Firepower 9300 Sm-40
Cisco Firepower 9300 Sm-44
Cisco Firepower 9300 Sm-44 X 3
Cisco Firepower 9300 Sm-48
Cisco Firepower 9300 Sm-56
Cisco Firepower 9300 Sm-56 X 3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2023-20016.

  • What is the severity level of CVE-2023-20016?

    CVE-2023-20016 has a severity level of medium (6.5).

  • What software is affected by CVE-2023-20016?

    Cisco UCS Manager Software and Cisco FXOS Software are affected by CVE-2023-20016.

  • How can an unauthenticated attacker exploit CVE-2023-20016?

    An unauthenticated attacker with access to a backup file can exploit CVE-2023-20016 to decrypt sensitive information stored in the full state and configuration backup file.

  • Where can I find more information about CVE-2023-20016?

    You can find more information about CVE-2023-20016 in the Cisco Security Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-bkpsky-H8FCQgsA

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203