CVE-2020-3483

CVSS V2 Low 3.3 CVSS V3 Medium 6.3
Description
Duo has identified and fixed an issue with the Duo Network Gateway (DNG) product in which some customer-provided SSL certificates and private keys were not excluded from logging. This issue resulted in certificate and private key information being written out in plain-text to local files on the DNG host. Any private keys logged in this way could be viewed by those with access to the DNG host operating system without any need for reversing encrypted values or similar techniques. An attacker that gained access to the DNG logs and with the ability to intercept and manipulate network traffic between a user and the DNG, could decrypt and manipulate SSL/TLS connections to the DNG and to the protected applications behind it. Duo Network Gateway (DNG) versions 1.3.3 through 1.5.7 are affected.
Overview
  • CVE ID
  • CVE-2020-3483
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-10-14T19:15:14
  • Last Modified Date
  • 2020-10-29T19:55:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cisco:duo_network_gateway:*:*:*:*:*:*:*:* 1 OR 1.3.3 1.5.7
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:P/I:P/A:N
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 3.3
  • Severity
  • LOW
  • Exploitability Score
  • 3.4
  • Impact Score
  • 4.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 6.3
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 1
  • Impact Score
  • 5.2
References
Reference URL Reference Tags
https://duo.com/labs/psa/duo-psa-2020-004 Patch Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:21:38 Added to TrackCVE
2022-12-05 00:06:00 psirt@cisco.com ykramarz@cisco.com CVE Assigner updated
2022-12-05 00:06:00 2020-10-14T19:15Z 2020-10-14T19:15:14 CVE Published Date updated
2022-12-05 00:06:00 2020-10-29T19:55:59 CVE Modified Date updated
2022-12-05 00:06:00 Analyzed Vulnerability Status updated