// For flags

CVE-2024-20323

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in Cisco Intelligent Node (iNode) Software could allow an unauthenticated, remote attacker to hijack the TLS connection between Cisco iNode Manager and associated intelligent nodes and send arbitrary traffic to an affected device.
This vulnerability is due to the presence of hard-coded cryptographic material. An attacker in a man-in-the-middle position between Cisco iNode Manager and associated deployed nodes could exploit this vulnerability by using the static cryptographic key to generate a trusted certificate and impersonate an affected device. A successful exploit could allow the attacker to read data that is meant for a legitimate device, modify the startup configuration of an associated node, and, consequently, cause a denial of service (DoS) condition for downstream devices that are connected to the affected node.

Una vulnerabilidad en el software Cisco Intelligent Node (iNode) podría permitir que un atacante remoto no autenticado secuestrara la conexión TLS entre Cisco iNode Manager y los nodos inteligentes asociados y enviara tráfico arbitrario a un dispositivo afectado. Esta vulnerabilidad se debe a la presencia de material criptográfico codificado. Un atacante en una posición intermedia entre Cisco iNode Manager y los nodos implementados asociados podría aprovechar esta vulnerabilidad utilizando la clave criptográfica estática para generar un certificado confiable y hacerse pasar por un dispositivo afectado. Un exploit exitoso podría permitir al atacante leer datos destinados a un dispositivo legítimo, modificar la configuración de inicio de un nodo asociado y, en consecuencia, causar una condición de denegación de servicio (DoS) para los dispositivos posteriores que están conectados al nodo afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-11-08 CVE Reserved
  • 2024-07-17 CVE Published
  • 2024-07-18 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-321: Use of Hard-coded Cryptographic Key
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -