// For flags

CVE-2020-3483

Duo Network Gateway (DNG) Information Disclosure Vulnerability

Severity Score

6.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Duo has identified and fixed an issue with the Duo Network Gateway (DNG) product in which some customer-provided SSL certificates and private keys were not excluded from logging. This issue resulted in certificate and private key information being written out in plain-text to local files on the DNG host. Any private keys logged in this way could be viewed by those with access to the DNG host operating system without any need for reversing encrypted values or similar techniques. An attacker that gained access to the DNG logs and with the ability to intercept and manipulate network traffic between a user and the DNG, could decrypt and manipulate SSL/TLS connections to the DNG and to the protected applications behind it. Duo Network Gateway (DNG) versions 1.3.3 through 1.5.7 are affected.

Duo ha identificado y corregido un problema con el producto Duo Network Gateway (DNG) en el que algunos certificados SSL proporcionados por el cliente y claves privadas no fueron excluidas del registro. Este problema resultó en que la información del certificado y la clave privada ha sido escrita en texto plano para archivos locales en el host DNG. Cualquier clave privada registrada de esta manera podría ser visualizada por aquellos con acceso al sistema operativo host DNG sin necesidad de invertir valores cifrados o técnicas similares. Un atacante que consiguió acceso a los registros DNG y con la capacidad de interceptar y manipular el tráfico de red entre un usuario y el DNG, podría descifrar y manipular conexiones SSL/TLS en el DNG y en las aplicaciones protegidas detrás de él. Duo Network Gateway (DNG) versiones 1.3.3 hasta 1.5.7 están afectadas

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-10-14 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-256: Plaintext Storage of a Password
  • CWE-522: Insufficiently Protected Credentials
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Duo Network Gateway
Search vendor "Cisco" for product "Duo Network Gateway"
>= 1.3.3 <= 1.5.7
Search vendor "Cisco" for product "Duo Network Gateway" and version " >= 1.3.3 <= 1.5.7"
-
Affected