// For flags

CVE-2022-20662

Cisco Duo for macOS Authentication Bypass Vulnerability

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the smart card login authentication of Cisco Duo for macOS could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability exists because the assigned user of a smart card is not properly matched with the authenticating user. An attacker could exploit this vulnerability by configuring a smart card login to bypass Duo authentication. A successful exploit could allow the attacker to use any personal identity verification (PIV) smart card for authentication, even if the smart card is not assigned to the authenticating user.

Una vulnerabilidad en la autenticación de inicio de sesión con tarjeta inteligente de Cisco Duo para macOS podría permitir a un atacante no autenticado con acceso físico omitir la autenticación. Esta vulnerabilidad se presenta porque el usuario asignado de una tarjeta inteligente no coincide apropiadamente con el usuario que es autenticado. Un atacante podría explotar esta vulnerabilidad al configurar el inicio de sesión de una tarjeta inteligente para omitir la autenticación de Duo. Una explotación con éxito podría permitir al atacante usar cualquier tarjeta inteligente de verificación de identidad personal (PIV) para la autenticación, incluso si la tarjeta inteligente no está asignada al usuario autenticador

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-09-30 CVE Published
  • 2024-03-10 EPSS Updated
  • 2024-11-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Duo
Search vendor "Cisco" for product "Duo"
< 2.0.0
Search vendor "Cisco" for product "Duo" and version " < 2.0.0"
macos
Affected