A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422 | Vendor Advisory |
https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-06-22 07:15
Updated : 2022-08-19 05:50
NVD link : CVE-2022-20651
Mitre link : CVE-2022-20651
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
cisco
- adaptive_security_device_manager