CVE-2024-20301
CVSS V2 None
CVSS V3 None
Description
A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device.
This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.
Overview
- CVE ID
- CVE-2024-20301
- Assigner
- cisco
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-06T16:28:22.087Z
- Last Modified Date
- 2024-06-04T17:40:41.658Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-win-bypass-pn42KKBm |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-20301 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20301 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 04:56:11 | Added to TrackCVE |