Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-12621

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-21 Aug, 2019 | 18:00
Updated At-20 Nov, 2024 | 17:12
Rejected At-
Credits

Cisco HyperFlex Static SSL Key Vulnerability

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:21 Aug, 2019 | 18:00
Updated At:20 Nov, 2024 | 17:12
Rejected At:
▼CVE Numbering Authority (CNA)
Cisco HyperFlex Static SSL Key Vulnerability

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco HyperFlex HX-Series
Versions
Affected
  • From unspecified before 4.0(1a) (custom)
Problem Types
TypeCWE IDDescription
CWECWE-320CWE-320
Type: CWE
CWE ID: CWE-320
Description: CWE-320
Metrics
VersionBase scoreBase severityVector
3.06.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey
vendor-advisory
x_refsource_CISCO
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey
Resource:
vendor-advisory
x_refsource_CISCO
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:21 Aug, 2019 | 18:15
Updated At:28 Oct, 2021 | 16:14

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.4HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Secondary3.06.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_m5_firmware>>3.0\(1a\)
cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.0\(1a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_m5_firmware>>3.5\(2a\)
cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.5\(2a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_m5>>-
cpe:2.3:h:cisco:hyperflex_hx220c_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_m5_firmware>>3.0\(1a\)
cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.0\(1a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_m5_firmware>>3.5\(2a\)
cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.5\(2a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_m5>>-
cpe:2.3:h:cisco:hyperflex_hx240c_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_af_m5_firmware>>3.0\(1a\)
cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.0\(1a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_af_m5_firmware>>3.5\(2a\)
cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.5\(2a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_af_m5>>-
cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_af_m5_firmware>>3.0\(1a\)
cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.0\(1a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_af_m5_firmware>>3.5\(2a\)
cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.5\(2a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx240c_af_m5>>-
cpe:2.3:h:cisco:hyperflex_hx240c_af_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_edge_m5_firmware>>3.0\(1a\)
cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.0\(1a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_edge_m5_firmware>>3.5\(2a\)
cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.5\(2a\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>hyperflex_hx220c_edge_m5>>-
cpe:2.3:h:cisco:hyperflex_hx220c_edge_m5:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-327Primarynvd@nist.gov
CWE-320Secondaryykramarz@cisco.com
CWE ID: CWE-327
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-320
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkeyykramarz@cisco.com
Vendor Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey
Source: ykramarz@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

98Records found

CVE-2019-15974
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 00:27
Updated-13 Nov, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Managed Services Accelerator Open Redirect Vulnerability

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-managed_services_acceleratorCisco Managed Services Accelerator
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2019-12665
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.29% / 51.79%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:15
Updated-21 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability

A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosCisco IOS 12.2(15)B
CWE ID-CWE-399
Not Available
CVE-2019-1659
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-21 Feb, 2019 | 15:00
Updated-20 Nov, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure Certificate Validation Vulnerability

A vulnerability in the Identity Services Engine (ISE) integration feature of Cisco Prime Infrastructure (PI) could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. The vulnerability is due to improper validation of the server SSL certificate when establishing the SSL tunnel with ISE. An attacker could exploit this vulnerability by using a crafted SSL certificate and could then intercept communications between the ISE and PI. A successful exploit could allow the attacker to view and alter potentially sensitive information that the ISE maintains about clients that are connected to the network. This vulnerability affects Cisco Prime Infrastructure Software Releases 2.2 through 3.4.0 when the PI server is integrated with ISE, which is disabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureCisco Prime Infrastructure
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-20860
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.25% / 48.29%
||
7 Day CHG-0.12%
Published-21 Jul, 2022 | 03:45
Updated-01 Nov, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus Dashboard SSL Certificate Validation Vulnerability

A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to alter communications with associated controllers or view sensitive information. This vulnerability exists because SSL server certificates are not validated when Cisco Nexus Dashboard is establishing a connection to Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud APIC, or Cisco Nexus Dashboard Fabric Controller, formerly Data Center Network Manager (DCNM) controllers. An attacker could exploit this vulnerability by using man-in-the-middle techniques to intercept the traffic between the affected device and the controllers, and then using a crafted certificate to impersonate the controllers. A successful exploit could allow the attacker to alter communications between devices or view sensitive information, including Administrator credentials for these controllers.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_dashboardCisco Nexus Dashboard
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-20742
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.13% / 33.53%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 03:16
Updated-06 Nov, 2024 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability

A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-325
Missing Cryptographic Step
CVE-2022-20814
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.23% / 45.27%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 15:32
Updated-31 Jul, 2025 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Series and Cisco TelePresence VCS Improper Certificate Validation Vulnerability

A vulnerability in the certificate validation of Cisco Expressway-C and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data.  The vulnerability is due to a lack of validation of the SSL server certificate that an affected device receives when it establishes a connection to a Cisco Unified Communications Manager device. An attacker could exploit this vulnerability by using a man-in-the-middle technique to intercept the traffic between the devices, and then using a self-signed certificate to impersonate the endpoint. A successful exploit could allow the attacker to view the intercepted traffic in clear text or alter the contents of the traffic. Note: Cisco Expressway-E is not affected by this vulnerability.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expresswaytelepresence_video_communication_server
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-20704
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-0.93% / 75.13%
||
7 Day CHG~0.00%
Published-10 Feb, 2022 | 17:06
Updated-06 Nov, 2024 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV Series Routers Vulnerabilities

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv260_firmwarerv340_firmwarerv345prv345rv160w_firmwarerv345p_firmwarerv160_firmwarerv260w_firmwarerv340w_firmwarerv160wrv260rv260wrv340wrv260prv345_firmwarerv340rv260p_firmwarerv160Cisco Small Business RV Series Router Firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-20817
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.89% / 74.61%
||
7 Day CHG-0.01%
Published-15 Jun, 2022 | 17:55
Updated-01 Nov, 2024 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone Duplicate Key Vulnerability

A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_ip_phone_8941unified_ip_phone_6911unified_ip_phone_8961_firmwareunified_ip_phone_6945_firmwareunified_ip_phone_6961_firmwareunified_ip_phone_9971_firmwareunified_ip_phone_8941_firmwareunified_ip_phone_9951unified_ip_phone_8945_firmwareunified_ip_phone_6945unified_ip_phone_6961ata_187_analog_telephone_adapter_firmwareunified_ip_phone_9951_firmwareunified_ip_phone_6911_firmwareunified_ip_phone_8961unified_ip_phone_8945ata_187_analog_telephone_adapterunified_ip_phone_6941unified_ip_phone_6921unified_ip_phone_9971unified_ip_phone_6921_firmwareunified_ip_phone_6941_firmwareCisco IP Phones with Multiplatform Firmware
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2018-0146
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.14% / 35.42%
||
7 Day CHG~0.00%
Published-22 Feb, 2018 | 00:00
Updated-02 Dec, 2024 | 21:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco Data Center Analytics Framework application could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to improper CSRF protection by the affected application. An attacker could exploit this vulnerability by persuading a user of the affected application to click a malicious link. A successful exploit could allow the attacker to submit arbitrary requests and take unauthorized actions on behalf of the user. Cisco Bug IDs: CSCvg45114.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-data_center_analytics_frameworkCisco Data Center Analytics Framework
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2018-0334
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 23.28%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 21:00
Updated-29 Nov, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the certificate management subsystem of Cisco AnyConnect Network Access Manager and of Cisco AnyConnect Secure Mobility Client for iOS, Mac OS X, Android, Windows, and Linux could allow an unauthenticated, remote attacker to bypass the TLS certificate check when downloading certain configuration files. The vulnerability is due to improper use of Simple Certificate Enrollment Protocol and improper server certificate validation. An attacker could exploit this vulnerability by preparing malicious profile and localization files for Cisco AnyConnect to use. A successful exploit could allow the attacker to remotely change the configuration profile, a certificate, or the localization data used by AnyConnect Secure Mobility Client. Cisco Bug IDs: CSCvh23141.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-anyconnect_secure_mobility_clientCisco AnyConnect Secure Mobility Client unknown
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-0444
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 29.25%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Packaged Contact Center Enterprise Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a stored XSS attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-packaged_contact_center_enterpriseCisco Packaged Contact Center Enterprise
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-0434
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.12% / 32.48%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Solution Certificate Validation Vulnerability

A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vedge_2000vedge_100_firmwarevedge_5000_firmwarevedge_1000_firmwarevmanage_network_management_systemvedge_5000vedge_100vedge_2000_firmwarevedge_1000Cisco SD-WAN Solution
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-0097
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.35%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 06:00
Updated-02 Dec, 2024 | 21:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect. The vulnerability is due to improper input validation of the parameters in the HTTP request. An attacker could exploit this vulnerability by crafting an HTTP request that could cause the web application to redirect the request to a specific malicious URL. This vulnerability is known as an open redirect attack and is used in phishing attacks to get users to visit malicious sites without their knowledge. Cisco Bug IDs: CSCve37646.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_infrastructureCisco Prime Infrastructure
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-0216
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 29.17%
||
7 Day CHG~0.00%
Published-08 Mar, 2018 | 07:00
Updated-02 Dec, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvf69805.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2017-6670
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.26% / 48.61%
||
7 Day CHG~0.00%
Published-13 Jun, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based GUI of Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect issue. More Information: CSCvc54813. Known Affected Releases: 8.1(7)ER1.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_domain_managerCisco Unified Communications Domain Manager
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-3840
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 50.83%
||
7 Day CHG~0.00%
Published-22 Feb, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect Vulnerability. More Information: CSCvc04849. Known Affected Releases: 5.8(2.5).

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_access_control_systemCisco Secure Access Control System
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-3799
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.21% / 43.68%
||
7 Day CHG~0.00%
Published-26 Jan, 2017 | 07:45
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in a URL parameter of Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to perform site redirection. More Information: CSCzu78401. Known Affected Releases: T28.1.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-webex_meeting_centerCisco WebEx Meeting Center T28.1
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2021-34764
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.32% / 54.80%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:55
Updated-07 Nov, 2024 | 21:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Software Cross-Site Scripting and Open Redirect Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an attacker to execute a cross-site scripting (XSS) attack or an open redirect attack. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_management_center_virtual_appliancefirepower_threat_defensesourcefire_defense_centerCisco Firepower Management Center
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-34772
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.18% / 40.25%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Orbital Open Redirect Vulnerability

A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-orbitalCisco Orbital
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2021-34743
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.23% / 45.53%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 02:50
Updated-07 Nov, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Software Application Authorization Bypass Vulnerability

A vulnerability in the application integration feature of Cisco Webex Software could allow an unauthenticated, remote attacker to authorize an external application to integrate with and access a user's account without that user's express consent. This vulnerability is due to improper validation of cross-site request forgery (CSRF) tokens. An attacker could exploit this vulnerability by convincing a targeted user who is currently authenticated to Cisco Webex Software to follow a link designed to pass malicious input to the Cisco Webex Software application authorization interface. A successful exploit could allow the attacker to cause Cisco Webex Software to authorize an application on the user's behalf without the express consent of the user, possibly allowing external applications to read data from that user's profile.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2014-0671
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.74% / 71.89%
||
7 Day CHG~0.00%
Published-22 Jan, 2014 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in Cisco MediaSense allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an unspecified parameter, aka Bug ID CSCum16749.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-mediasensen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1500
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.18% / 40.25%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 15:40
Updated-07 Nov, 2024 | 21:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Video Mesh Arbitrary Site Redirection Vulnerability

A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-collaboration_meeting_roomswebex_video_meshCisco Webex Video Mesh
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2021-1277
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.96%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Certificate Validation Vulnerabilities

Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-1397
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.18% / 39.81%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:42
Updated-08 Nov, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Open Redirect Vulnerability

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-c225_m6_firmwareucs-e140ducs-e140dp_firmwareucs-e160dp-m1_firmwareucs-e140dpc480_m5ucs-e180d-m2_firmwareencs_5400c220_m6_firmwareucs-e180d-m3c240_m5_firmwareucs_s3260c220_m5_firmwareucs-e160ducs-e140s-m1ucs-e1120d-m3c240_m6_firmwareucs-e160d_firmwareucs-e160dp-m1ucs_s3260_firmwarec480_m5_firmwareucs-e140sc240_m6c220_m6c240_m5ucs-e1120d-m3_firmwarec480_ml_m5integrated_management_controllerucs-e140d_firmwareucs-e140s_firmwareencs_5400_firmwareucs-e180d-m2encs_5100_firmwarec125_m5ucs-e140s-m2c225_m6c245_m6_firmwareucs_managerc245_m6c480_ml_m5_firmwareucs-e160s-m3_firmwareucs-e160s-m3c220_m5encs_5100c125_m5_firmwareucs-e180d-m3_firmwareucs-e140s-m2_firmwareucs-e140s-m1_firmwareCisco Unified Computing System (Standalone)
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2020-3578
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.20%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:40
Updated-13 Nov, 2024 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Portal Access Rule Bypass Vulnerability

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-3155
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.25% / 48.08%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 18:40
Updated-15 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Intelligent Proximity SSL Certificate Validation Vulnerability

A vulnerability in the SSL implementation of the Cisco Intelligent Proximity solution could allow an unauthenticated, remote attacker to view or alter information shared on Cisco Webex video devices and Cisco collaboration endpoints if the products meet the conditions described in the Vulnerable Products section. The vulnerability is due to a lack of validation of the SSL server certificate received when establishing a connection to a Cisco Webex video device or a Cisco collaboration endpoint. An attacker could exploit this vulnerability by using man in the middle (MITM) techniques to intercept the traffic between the affected client and an endpoint, and then using a forged certificate to impersonate the endpoint. Depending on the configuration of the endpoint, an exploit could allow the attacker to view presentation content shared on it, modify any content being presented by the victim, or have access to call controls. This vulnerability does not affect cloud registered collaboration endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabbermeetingtelepresence_codec_c90intelligence_proximitytelepresence_codec_c90_firmwarewebex_teamstelepresence_codec_c60telepresence_codec_c40telepresence_codec_c60_firmwaretelepresence_codec_c40_firmwarewebex_meetingsCisco Jabber IM for Android
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-3178
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:35
Updated-15 Nov, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Content Security Management Appliance Open Redirect Vulnerabilities

Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-content_security_management_applianceCisco Content Security Management Appliance (SMA)
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2020-24588
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-0.34% / 56.27%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 00:00
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

Action-Not Available
Vendor-ieeen/aIntel CorporationMicrosoft CorporationDebian GNU/LinuxLinux Kernel Organization, IncCisco Systems, Inc.Arista Networks, Inc.Siemens AG
Product-catalyst_9117_ap_firmwarewebex_room_kit_firmwareip_phone_8861ac_9560_firmwareir829gw-lte-ga-zk9_firmwareac_8265_firmware1100-8pscalance_w786-2_firmwarewindows_10ir829gw-lte-ga-ck9c-100_firmwarecatalyst_9115axe_firmware1109-2p_firmwareproset_ac_9560_firmwaremeraki_z3webex_room_70_single_g2catalyst_9120_ap_firmwareo-90_firmwareaironet_1810_firmwareac_9560killer_wi-fi_6_ax1650_firmwareproset_wireless_7265_\(rev_d\)meraki_gr60_firmware1101-4p_firmwareir829gw-lte-vz-ak9catalyst_9124axicatalyst_9115axicatalyst_9117aximeraki_mr70c-110proset_wi-fi_6_ax201_firmwaremeraki_mr55webex_dx70_firmwaremeraki_mr33_firmwarescalance_w748-1_firmwaremeraki_mx68cw_firmwarewebex_board_85s_firmwarec-110_firmwaremeraki_mr34_firmwaremeraki_mr52ir829-2lte-ea-bk9scalance_w1750dwebex_room_70_dual_firmwareaironet_1810w_firmwareir829gw-lte-ga-sk9_firmwarescalance_w774-1meraki_mx65w_firmwarescalance_w1788-1webex_room_55_dualcatalyst_9120axp_firmwareaironet_1815_firmwarescalance_w786-1meraki_mr42proset_ac_9560c-235c-230c-200_firmwaremeraki_mr86meraki_mr36_firmwarecatalyst_9120axe_firmwareproset_ac_9260_firmwaremeraki_mr32_firmwarec-230_firmwareir829gw-lte-ga-ck9_firmwarewi-fi_6_ax200_firmwaremeraki_mr42_firmwareproset_ac_9462_firmwarewebex_room_kit_mini_firmwaremeraki_mr46eproset_wireless_7265_\(rev_d\)_firmwareaironet_1532killer_wi-fi_6e_ax1675ir829gw-lte-vz-ak9_firmwarecatalyst_9117axi_firmwarewebex_room_70_dual_g2_firmwareir829-2lte-ea-ak9_firmwareproset_wi-fi_6e_ax210_firmwaremeraki_gr10_firmwareaironet_1542i_firmwarescalance_w761-1webex_room_kitmeraki_mr32scalance_w722-1_firmwareaironet_1852meraki_mx68wscalance_wam766-1_6ghz_firmwarecatalyst_9105axiscalance_wam763-1_firmwarescalance_w734-1_firmwarec-235_firmware1109-4pip_phone_8861_firmwaremeraki_mr33webex_board_70swebex_room_kit_miniaironet_1800i_firmwaremeraki_mr76meraki_mr53e_firmwareaironet_18421100-8p_firmwareproset_ac_3165scalance_w788-1_firmwaremeraki_mr46e_firmwaremeraki_mx68w_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mr46_firmwarewebex_dx80scalance_w1788-2_firmwarecatalyst_9130_approset_ac_9462meraki_mr12_firmwareaironet_1542iaironet_1842_firmwaremeraki_mr84webex_room_55_firmwaremeraki_mx67cwir829gw-lte-ga-zk9ip_phone_8821_firmwarecatalyst_9120axpac_8260_firmwarec-250webex_board_55_firmware1100_firmwarescalance_wum763-1_firmwarescalance_w1748-1w-118meraki_mr20_firmwarec-100scalance_w734-1ip_phone_6861scalance_w774-1_firmwarescalance_wum763-1proset_ac_9260catalyst_9105_firmwaremeraki_mx68cwproset_ac_8260catalyst_9120axi_firmwarewebex_room_55_dual_firmwarescalance_w721-1_firmwaremeraki_mr52_firmwarecatalyst_9115_approset_wi-fi_6e_ax210scalance_w1788-2ia_firmwarescalance_wum766-1_6ghzscalance_w721-1meraki_mr46meraki_mr56catalyst_9130_ap_firmwarecatalyst_9130_firmwarescalance_w748-11109-2pwebex_room_55catalyst_9120axemeraki_mr42e_firmwarekiller_wi-fi_6_ax1650meraki_mr55_firmwarekiller_ac_1550_firmwareir829-2lte-ea-ek9catalyst_9115axi_firmwareir829-2lte-ea-ek9_firmwarescalance_w786-2ia_firmwarew-118_firmwareproset_ac_8260_firmwareaironet_1815i_firmwarecatalyst_9117meraki_mr72webex_room_70c-65_firmwarecatalyst_9130axiwindows_rt_8.1webex_dx80_firmwarescalance_w778-1_firmwarescalance_w788-2_firmwarec-120_firmwarecatalyst_9115_firmwareproset_ac_9461_firmwarec-75meraki_mr74_firmwaremeraki_mx67w_firmwaremeraki_gr10aironet_1810windows_server_2019meraki_mx67wmeraki_mr84_firmwaremeraki_mr53ip_phone_8832scalance_w761-1_firmware1100-4p_firmwareaironet_iw3702_firmwarecatalyst_9105axwaironet_1832_firmwarescalance_wum766-1scalance_w1750d_firmwarescalance_wam766-1_6ghzproset_ac_8265catalyst_9130axe_firmwarewebex_dx70c-130_firmwarec-120meraki_mr70_firmwarecatalyst_9105axi_firmwaremeraki_z3cac_9260_firmwarew-68aironet_1832aironet_1815icatalyst_9120_apmeraki_mr26_firmwareip_phone_8865_firmwareip_phone_8865meraki_mr53_firmwareip_phone_8832_firmwaremeraki_mr76_firmwaremeraki_mr34debian_linuxip_phone_6861_firmwarescalance_w1788-2iaaironet_1800imeraki_mr20windows_server_2008scalance_w786-2o-105ir829gw-lte-na-ak9_firmwaremeraki_mr44meraki_mr12meraki_mr66_firmwarecatalyst_9130axi_firmwarescalance_wum766-1_firmwarewi-fi_6_ax200meraki_mr45_firmwarescalance_w778-1webex_room_70_single_firmwarescalance_w1788-1_firmwarescalance_w738-1_firmwaremeraki_z3c_firmwareproset_ac_8265_firmware1101-4paironet_ap803_firmwareir829gw-lte-ga-ek9aironet_1800c-65catalyst_9124_firmware1100-4pmeraki_mr62_firmwarescalance_w1748-1_firmwarecatalyst_9130c-75_firmwareieee_802.11scalance_wum766-1_6ghz_firmwarecatalyst_9115_ap_firmwareo-105_firmwarescalance_w786-2iameraki_mr45catalyst_9120axiscalance_wam763-1ir829gw-lte-na-ak9catalyst_9115axewebex_room_70_firmwareproset_ac_3165_firmwaremeraki_mx65wc-260_firmwarewi-fi_6_ax201windows_7webex_board_55scatalyst_9124axd_firmwarescalance_wam766-1_firmwarec-130meraki_mr53eaironet_1542d_firmwarecatalyst_9105scalance_w738-1scalance_w1788-2proset_ac_3168c-2001109-4p_firmwarewi-fi_6_ax201_firmwarewindows_8.1webex_board_70aironet_1810waironet_iw3702scalance_w722-1ir829-2lte-ea-bk9_firmwarecatalyst_9130axemeraki_z3_firmwarecatalyst_9105axw_firmwarecatalyst_9117_firmwarec-250_firmwarewebex_room_70_single_g2_firmwarewebex_board_55scalance_w786-1_firmwareaironet_1815webex_board_85sc-260webex_room_70_dualaironet_1852_firmwareac_8265proset_ac_3168_firmwarecatalyst_9124axi_firmwareo-90webex_room_70_dual_g2meraki_mr72_firmwarecatalyst_9120_firmwareaironet_ap803meraki_gr60linux_kernelscalance_w788-1catalyst_9117_apmeraki_mr62aironet_1800_firmwaremeraki_mr42ekiller_ac_1550meraki_mr30hwindows_server_2016meraki_mx64w_firmwarewindows_server_2012webex_room_70_singlewebex_board_70_firmwarecatalyst_9124meraki_mr56_firmwaremeraki_mx64ww-68_firmwaremeraki_mr26webex_board_55s_firmwaremeraki_mr86_firmware1100meraki_mx67cw_firmwareac_8260scalance_wam766-1meraki_mr44_firmwareproset_wi-fi_6_ax201scalance_w788-2proset_wi-fi_6_ax200ir829-2lte-ea-ak9ip_phone_8821catalyst_9115ir829gw-lte-ga-sk9mac80211aironet_1542dcatalyst_9120meraki_mr36meraki_mr66catalyst_9124axdproset_wi-fi_6_ax200_firmwaremeraki_mr74ac_9260webex_board_70s_firmwaremeraki_mr30h_firmwareproset_ac_9461ir829gw-lte-ga-ek9_firmwareaironet_1532_firmwaren/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2017-17428
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-79.61% / 99.05%
||
7 Day CHG~0.00%
Published-05 Mar, 2018 | 18:00
Updated-05 Aug, 2024 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.

Action-Not Available
Vendor-caviumn/aCisco Systems, Inc.
Product-nitrox_v_ssl_sdknitrox_ssl_sdkadaptive_security_appliance_5510_firmwareadaptive_security_appliance_5505_firmwareace30_application_control_engine_module_firmwareturbossl_sdkadaptive_security_appliance_5520_firmwareocteon_sdkadaptive_security_appliance_5540adaptive_security_appliance_5510ace4710_application_control_engine_firmwarewebex_meetingswebex_conect_imadaptive_security_appliance_5520ace_4710_application_control_engineadaptive_security_appliance_5540_firmwareadaptive_security_appliance_5505adaptive_security_appliance_5550_firmwareocteon_ssl_sdkadaptive_security_appliance_5550ace30_application_control_engine_modulen/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-1828
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 22.93%
||
7 Day CHG~0.00%
Published-04 Apr, 2019 | 15:30
Updated-21 Nov, 2024 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv325rv325_firmwarerv320rv320_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2020-26140
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.43% / 61.57%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 19:34
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.

Action-Not Available
Vendor-alfan/aIntel CorporationArista Networks, Inc.Siemens AGCisco Systems, Inc.
Product-catalyst_9117_ap_firmwarewebex_room_kit_firmwareip_phone_8861ac_9560_firmwareir829gw-lte-ga-zk9_firmwareac_8265_firmware1100-8pscalance_w786-2_firmwareir829gw-lte-ga-ck9c-100_firmwarecatalyst_9115axe_firmware1109-2p_firmwareproset_ac_9560_firmwaremeraki_z3webex_room_70_single_g2catalyst_9120_ap_firmwareaironet_1562eo-90_firmwareaironet_1810_firmwareac_9560killer_wi-fi_6_ax1650_firmwareaironet_2800i_firmwaremeraki_gr60_firmwareproset_wireless_7265_\(rev_d\)aironet_17021101-4p_firmwareir829gw-lte-vz-ak9aironet_3800p_firmwarecatalyst_9124axicatalyst_9115axiaironet_2702aironet_4800catalyst_9117aximeraki_mr70c-110aironet_3800proset_wi-fi_6_ax201_firmwaremeraki_mr55catalyst_iw6300_firmwarewebex_dx70_firmwaremeraki_mr33_firmwarescalance_w748-1_firmwaremeraki_mx68cw_firmwarewebex_board_85s_firmwarec-110_firmwaremeraki_mr34_firmwaremeraki_mr52aironet_1562d_firmwareir829-2lte-ea-bk9scalance_w1750daironet_3800iwebex_room_70_dual_firmwareaironet_1810w_firmwareir829gw-lte-ga-sk9_firmwarescalance_w774-1aironet_1552hmeraki_mx65w_firmwarescalance_w1788-1webex_room_55_dualcatalyst_9120axp_firmwareaironet_1815_firmwarescalance_w786-1meraki_mr42proset_ac_9560c-235c-230c-200_firmwaremeraki_mr86meraki_mr36_firmwarecatalyst_9120axe_firmwareproset_ac_9260_firmwaremeraki_mr32_firmwarec-230_firmwareir829gw-lte-ga-ck9_firmwarewi-fi_6_ax200_firmwareaironet_3800e_firmwaremeraki_mr42_firmwareproset_ac_9462_firmwarewebex_room_kit_mini_firmwaremeraki_mr46eproset_wireless_7265_\(rev_d\)_firmwareaironet_1532killer_wi-fi_6e_ax1675ir829gw-lte-vz-ak9_firmwarecatalyst_9117axi_firmwarewebex_room_70_dual_g2_firmwareir829-2lte-ea-ak9_firmwareproset_wi-fi_6e_ax210_firmwaremeraki_gr10_firmwareaironet_1542i_firmwarescalance_w761-1aironet_1572webex_room_kitmeraki_mr32scalance_w722-1_firmwareaironet_1852meraki_mx68wesw-6300-con-x-k9catalyst_iw6300_dcw_firmwarescalance_wam766-1_6ghz_firmwarecatalyst_9105axiaironet_2800e_firmwarescalance_wam763-1_firmwarescalance_w734-1_firmwareaironet_1552c-235_firmware1109-4pip_phone_8861_firmwaremeraki_mr33webex_board_70saironet_3800_firmwareawus036h_firmwareaironet_3702webex_room_kit_miniaironet_1800i_firmwarecatalyst_iw6300_dcwesw-6300-con-x-k9_firmwaremeraki_mr76catalyst_iw6300_acmeraki_mr53e_firmwareaironet_18421100-8p_firmwareproset_ac_3165scalance_w788-1_firmwarecatalyst_iw6300_ac_firmwaremeraki_mr46e_firmwaremeraki_mx68w_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mr46_firmwarewebex_dx80scalance_w1788-2_firmwarecatalyst_9130_approset_ac_9462meraki_mr12_firmwareaironet_1542iaironet_1842_firmwareaironet_3800pwebex_room_55_firmwaremeraki_mr84meraki_mx67cwir829gw-lte-ga-zk9ip_phone_8821_firmwarecatalyst_9120axpaironet_2800_firmwareac_8260_firmwarec-250webex_board_55_firmware1100_firmwarescalance_wum763-1_firmwarescalance_w1748-1w-118meraki_mr20_firmwarec-100scalance_w734-1ip_phone_6861scalance_w774-1_firmwarescalance_wum763-1proset_ac_9260catalyst_9105_firmwaremeraki_mx68cwproset_ac_8260catalyst_9120axi_firmwarewebex_room_55_dual_firmwarescalance_w721-1_firmwaremeraki_mr52_firmwarecatalyst_9115_approset_wi-fi_6e_ax210scalance_w1788-2ia_firmwarescalance_wum766-1_6ghzscalance_w721-1meraki_mr46meraki_mr56catalyst_9130_ap_firmwarecatalyst_9130_firmwarescalance_w748-11109-2pwebex_room_55catalyst_9120axemeraki_mr42e_firmwarekiller_wi-fi_6_ax1650meraki_mr55_firmwarekiller_ac_1550_firmwareir829-2lte-ea-ek9catalyst_9115axi_firmwareir829-2lte-ea-ek9_firmwarescalance_w786-2ia_firmwarew-118_firmwareproset_ac_8260_firmwareaironet_1815i_firmwarecatalyst_9117aironet_1572_firmwaremeraki_mr72webex_room_70c-65_firmwarecatalyst_9130axiaironet_2800webex_dx80_firmwarescalance_w778-1_firmwarescalance_w788-2_firmwarec-120_firmwareawus036hcatalyst_9115_firmwareproset_ac_9461_firmwareaironet_1562e_firmwarec-75meraki_mr74_firmwaremeraki_mx67w_firmwaremeraki_gr10aironet_1810aironet_1562imeraki_mx67wmeraki_mr84_firmwaremeraki_mr53ip_phone_8832scalance_w761-1_firmware1100-4p_firmwareaironet_iw3702_firmwarecatalyst_9105axwesw6300aironet_1832_firmwareaironet_3702_firmwarescalance_wum766-1scalance_w1750d_firmwarescalance_wam766-1_6ghzproset_ac_8265aironet_1552_firmwarecatalyst_9130axe_firmwarewebex_dx70c-130_firmwarec-120meraki_mr70_firmwareaironet_2800icatalyst_9105axi_firmwaremeraki_z3ccatalyst_iw6300_dc_firmwareac_9260_firmwarew-68aironet_1832aironet_1815icatalyst_9120_apmeraki_mr26_firmwareip_phone_8865_firmwareaironet_4800_firmwareip_phone_8865meraki_mr53_firmwareip_phone_8832_firmwaremeraki_mr76_firmwaremeraki_mr34ip_phone_6861_firmwareaironet_1562i_firmwarescalance_w1788-2iaaironet_1800imeraki_mr20scalance_w786-2o-105aironet_1560ir829gw-lte-na-ak9_firmwaremeraki_mr44meraki_mr12meraki_mr66_firmwarecatalyst_9130axi_firmwarescalance_wum766-1_firmwarewi-fi_6_ax200meraki_mr45_firmwarescalance_w778-1webex_room_70_single_firmwarescalance_w1788-1_firmwarescalance_w738-1_firmwaremeraki_z3c_firmwareproset_ac_8265_firmware1101-4paironet_ap803_firmwareir829gw-lte-ga-ek9aironet_1800c-65catalyst_9124_firmware1100-4pmeraki_mr62_firmwarescalance_w1748-1_firmwareesw6300_firmwarecatalyst_9130c-75_firmwareaironet_1562dscalance_wum766-1_6ghz_firmwarecatalyst_9115_ap_firmwareo-105_firmwarescalance_w786-2iameraki_mr45catalyst_9120axiscalance_wam763-1ir829gw-lte-na-ak9catalyst_9115axewebex_room_70_firmwareproset_ac_3165_firmwaremeraki_mx65wc-260_firmwarewi-fi_6_ax201catalyst_9124axd_firmwarewebex_board_55sscalance_wam766-1_firmwarec-130meraki_mr53eaironet_1542d_firmwarecatalyst_9105scalance_w738-1scalance_w1788-2proset_ac_3168c-2001109-4p_firmwarecatalyst_iw6300wi-fi_6_ax201_firmwarewebex_board_70aironet_1810waironet_iw3702scalance_w722-1ir829-2lte-ea-bk9_firmwarecatalyst_9130axemeraki_z3_firmwarecatalyst_9105axw_firmwarecatalyst_9117_firmwarec-250_firmwarewebex_room_70_single_g2_firmwarewebex_board_55aironet_1560_firmwarescalance_w786-1_firmwarecatalyst_iw6300_dcaironet_1815webex_board_85sc-260webex_room_70_dualaironet_1852_firmwareac_8265proset_ac_3168_firmwarecatalyst_9124axi_firmwareo-90webex_room_70_dual_g2meraki_mr72_firmwarecatalyst_9120_firmwareaironet_ap803meraki_gr60aironet_2702_firmwarescalance_w788-1catalyst_9117_apmeraki_mr62aironet_2800eaironet_1800_firmwaremeraki_mr42ekiller_ac_1550aironet_1702_firmwaremeraki_mr30hmeraki_mx64w_firmwarewebex_room_70_singlecatalyst_9124webex_board_70_firmwaremeraki_mx64wmeraki_mr56_firmwarew-68_firmwaremeraki_mr26aironet_3800ewebex_board_55s_firmwaremeraki_mr86_firmware1100meraki_mx67cw_firmwareaironet_3800i_firmwareac_8260scalance_wam766-1meraki_mr44_firmwareproset_wi-fi_6_ax201scalance_w788-2proset_wi-fi_6_ax200ir829-2lte-ea-ak9ip_phone_8821catalyst_9115ir829gw-lte-ga-sk9aironet_1542dcatalyst_9120meraki_mr36meraki_mr66catalyst_9124axdaironet_1552h_firmwareproset_wi-fi_6_ax200_firmwaremeraki_mr74ac_9260webex_board_70s_firmwaremeraki_mr30h_firmwareproset_ac_9461ir829gw-lte-ga-ek9_firmwareaironet_1532_firmwaren/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-37464
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.25% / 48.38%
||
7 Day CHG~0.00%
Published-14 Jul, 2023 | 20:25
Updated-13 Feb, 2025 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authentication Tag length usage in AES GCM decryption in OpenIDC/cjose

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

Action-Not Available
Vendor-OpenIDCCisco Systems, Inc.
Product-cjosecjosecjose
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-1706
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.54% / 66.73%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 16:10
Updated-19 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software IPsec Denial of Service Vulnerability

A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa-5545-xasa-5506-xasa-5516-xasa-5506h-xasa-5506w-xadaptive_security_appliance_softwareasa-5508-xasa-5525-xasa-5555-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-1586
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.05% / 16.27%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 14:45
Updated-21 Nov, 2024 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability

A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllerCisco Application Policy Infrastructure Controller (APIC)
CWE ID-CWE-320
Not Available
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-20805
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-21 Apr, 2022 | 18:51
Updated-06 Nov, 2024 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability

A vulnerability in the automatic decryption process in Cisco Umbrella Secure Web Gateway (SWG) could allow an authenticated, adjacent attacker to bypass the SSL decryption and content filtering policies on an affected system. This vulnerability is due to how the decryption function uses the TLS Sever Name Indication (SNI) extension of an HTTP request to discover the destination domain and determine if the request needs to be decrypted. An attacker could exploit this vulnerability by sending a crafted request over TLS from a client to an unknown or controlled URL. A successful exploit could allow an attacker to bypass the decryption process of Cisco Umbrella SWG and allow malicious content to be downloaded to a host on a protected network. There are workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-umbrella_secure_web_gatewayCisco Umbrella Insights Virtual Appliance
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-15397
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.24% / 47.53%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability

A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centeradaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-320
Not Available
CVE-2018-0124
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.15% / 77.65%
||
7 Day CHG~0.00%
Published-22 Feb, 2018 | 00:00
Updated-02 Dec, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to bypass security protections, gain elevated privileges, and execute arbitrary code. The vulnerability is due to insecure key generation during application configuration. An attacker could exploit this vulnerability by using a known insecure key value to bypass security protections by sending arbitrary requests using the insecure key to a targeted application. An exploit could allow the attacker to execute arbitrary code. This vulnerability affects Cisco Unified Communications Domain Manager releases prior to 11.5(2). Cisco Bug IDs: CSCuv67964.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_domain_managerCisco Unified Communications Domain Manager
CWE ID-CWE-320
Not Available
CVE-2020-24587
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-0.34% / 56.30%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 00:00
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.

Action-Not Available
Vendor-ieeen/aIntel CorporationDebian GNU/LinuxLinux Kernel Organization, IncCisco Systems, Inc.Arista Networks, Inc.
Product-catalyst_9117_ap_firmwarewebex_room_kit_firmwareip_phone_8861ac_9560_firmwareir829gw-lte-ga-zk9_firmwareac_8265_firmware1100-8pir829gw-lte-ga-ck9c-100_firmwarecatalyst_9115axe_firmware1109-2p_firmwareproset_ac_9560_firmwaremeraki_z3webex_room_70_single_g2catalyst_9120_ap_firmwareo-90_firmwareaironet_1810_firmwareac_9560killer_wi-fi_6_ax1650_firmwareaironet_2800i_firmwaremeraki_gr60_firmwareproset_wireless_7265_\(rev_d\)aironet_17021101-4p_firmwareir829gw-lte-vz-ak9aironet_3800p_firmwarecatalyst_9124axicatalyst_9115axiaironet_2702aironet_4800catalyst_9117aximeraki_mr70c-110aironet_3800proset_wi-fi_6_ax201_firmwaremeraki_mr55catalyst_iw6300_firmwarewebex_dx70_firmwaremeraki_mr33_firmwaremeraki_mx68cw_firmwarewebex_board_85s_firmwarec-110_firmwaremeraki_mr34_firmwaremeraki_mr52ir829-2lte-ea-bk9aironet_3800iwebex_room_70_dual_firmwareaironet_1810w_firmwareir829gw-lte-ga-sk9_firmwareaironet_1552hmeraki_mx65w_firmwarewebex_room_55_dualcatalyst_9120axp_firmwareaironet_1815_firmwaremeraki_mr42proset_ac_9560c-235c-200_firmwarec-230meraki_mr86meraki_mr36_firmwarecatalyst_9120axe_firmwareproset_ac_9260_firmwaremeraki_mr32_firmwarec-230_firmwareir829gw-lte-ga-ck9_firmwarewi-fi_6_ax200_firmwareaironet_3800e_firmwaremeraki_mr42_firmwareproset_ac_9462_firmwarewebex_room_kit_mini_firmwaremeraki_mr46eproset_wireless_7265_\(rev_d\)_firmwareaironet_1532killer_wi-fi_6e_ax1675ir829gw-lte-vz-ak9_firmwarecatalyst_9117axi_firmwarewebex_room_70_dual_g2_firmwareir829-2lte-ea-ak9_firmwareproset_wi-fi_6e_ax210_firmwaremeraki_gr10_firmwareaironet_1542i_firmwareaironet_1572webex_room_kitmeraki_mr32aironet_1852meraki_mx68wcatalyst_iw6300_dcw_firmwarecatalyst_9105axiaironet_2800e_firmwareaironet_1552c-235_firmware1109-4pip_phone_8861_firmwaremeraki_mr33webex_board_70saironet_3800_firmwareaironet_3702webex_room_kit_miniaironet_1800i_firmwarecatalyst_iw6300_dcwmeraki_mr76catalyst_iw6300_acmeraki_mr53e_firmwareaironet_18421100-8p_firmwareproset_ac_3165catalyst_iw6300_ac_firmwaremeraki_mr46e_firmwaremeraki_mx68w_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mr46_firmwarewebex_dx80catalyst_9130_approset_ac_9462meraki_mr12_firmwareaironet_1542iaironet_1842_firmwareaironet_3800pwebex_room_55_firmwaremeraki_mr84meraki_mx67cwir829gw-lte-ga-zk9ip_phone_8821_firmwarecatalyst_9120axpaironet_2800_firmwareac_8260_firmwarec-250webex_board_55_firmware1100_firmwarew-118meraki_mr20_firmwarec-100ip_phone_6861proset_ac_9260catalyst_9105_firmwaremeraki_mx68cwproset_ac_8260catalyst_9120axi_firmwarewebex_room_55_dual_firmwaremeraki_mr52_firmwarecatalyst_9115_approset_wi-fi_6e_ax210meraki_mr46meraki_mr56catalyst_9130_ap_firmwarecatalyst_9130_firmwarewebex_room_551109-2pcatalyst_9120axemeraki_mr42e_firmwarekiller_wi-fi_6_ax1650meraki_mr55_firmwarekiller_ac_1550_firmwareir829-2lte-ea-ek9catalyst_9115axi_firmwareir829-2lte-ea-ek9_firmwarew-118_firmwareproset_ac_8260_firmwareaironet_1815i_firmwarecatalyst_9117aironet_1572_firmwaremeraki_mr72webex_room_70c-65_firmwarecatalyst_9130axiaironet_2800webex_dx80_firmwarec-120_firmwarecatalyst_9115_firmwareproset_ac_9461_firmwarec-75meraki_mr74_firmwaremeraki_mx67w_firmwaremeraki_gr10aironet_1810meraki_mx67wmeraki_mr84_firmwaremeraki_mr53ip_phone_88321100-4p_firmwareaironet_iw3702_firmwarecatalyst_9105axwesw6300aironet_1832_firmwareaironet_3702_firmwareproset_ac_8265aironet_1552_firmwarecatalyst_9130axe_firmwarewebex_dx70c-130_firmwarec-120meraki_mr70_firmwareaironet_2800icatalyst_9105axi_firmwaremeraki_z3ccatalyst_iw6300_dc_firmwareac_9260_firmwarew-68aironet_1832aironet_1815icatalyst_9120_apmeraki_mr26_firmwareip_phone_8865_firmwareaironet_4800_firmwareip_phone_8865meraki_mr53_firmwareip_phone_8832_firmwaremeraki_mr76_firmwaremeraki_mr34debian_linuxip_phone_6861_firmwareaironet_1800imeraki_mr20o-105ir829gw-lte-na-ak9_firmwaremeraki_mr44meraki_mr12meraki_mr66_firmwarecatalyst_9130axi_firmwarewi-fi_6_ax200meraki_mr45_firmwarewebex_room_70_single_firmwareir829gw-lte-ga-ek9meraki_z3c_firmwareproset_ac_8265_firmwareaironet_18001101-4paironet_ap803_firmwarec-65catalyst_9124_firmware1100-4pmeraki_mr62_firmwareesw6300_firmwarecatalyst_9130c-75_firmwareieee_802.11catalyst_9115_ap_firmwareo-105_firmwaremeraki_mr45catalyst_9120axiir829gw-lte-na-ak9catalyst_9115axewebex_room_70_firmwareproset_ac_3165_firmwaremeraki_mx65wc-260_firmwarewi-fi_6_ax201catalyst_9124axd_firmwarewebex_board_55sc-130meraki_mr53eaironet_1542d_firmwarecatalyst_9105proset_ac_3168c-2001109-4p_firmwarecatalyst_iw6300wi-fi_6_ax201_firmwarewebex_board_70aironet_1810waironet_iw3702ir829-2lte-ea-bk9_firmwarecatalyst_9130axemeraki_z3_firmwarecatalyst_9105axw_firmwarecatalyst_9117_firmwarec-250_firmwarewebex_room_70_single_g2_firmwarewebex_board_55catalyst_iw6300_dcaironet_1815webex_board_85sc-260webex_room_70_dualaironet_1852_firmwareac_8265proset_ac_3168_firmwarecatalyst_9124axi_firmwareo-90webex_room_70_dual_g2meraki_mr72_firmwarecatalyst_9120_firmwareaironet_ap803meraki_gr60linux_kernelaironet_2702_firmwarecatalyst_9117_apmeraki_mr62aironet_2800eaironet_1800_firmwaremeraki_mr42ekiller_ac_1550aironet_1702_firmwaremeraki_mr30hmeraki_mx64w_firmwarewebex_room_70_singlecatalyst_9124webex_board_70_firmwaremeraki_mx64wmeraki_mr56_firmwarew-68_firmwaremeraki_mr26aironet_3800ewebex_board_55s_firmwaremeraki_mr86_firmware1100meraki_mx67cw_firmwareaironet_3800i_firmwareac_8260meraki_mr44_firmwareproset_wi-fi_6_ax201proset_wi-fi_6_ax200ir829-2lte-ea-ak9ip_phone_8821catalyst_9115ir829gw-lte-ga-sk9mac80211aironet_1542dcatalyst_9120meraki_mr36meraki_mr66catalyst_9124axdaironet_1552h_firmwareproset_wi-fi_6_ax200_firmwaremeraki_mr74ac_9260webex_board_70s_firmwaremeraki_mr30h_firmwareproset_ac_9461ir829gw-lte-ga-ek9_firmwareaironet_1532_firmwaren/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2021-22212
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4||MEDIUM
EPSS-0.14% / 34.52%
||
7 Day CHG~0.00%
Published-08 Jun, 2021 | 12:07
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens the key, or fails to load these keys entirely, depending on the key type and the placement of the '#'. This results in the administrator not being able to use the keys as expected or the keys are shorter than expected and easier to brute-force, possibly resulting in MITM attacks between ntp clients and ntp servers. For short AES128 keys, ntpd generates a warning that it is padding them.

Action-Not Available
Vendor-ntpsecNTPsecFedora Project
Product-ntpsecfedorantpsec
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-22812
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-7.4||HIGH
EPSS-0.09% / 25.99%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-19 Feb, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SanDisk PrivateAccess Deprecated TLS protocol versions supported

SanDisk PrivateAccess versions prior to 6.4.9 support insecure TLS 1.0 and TLS 1.1 protocols which are susceptible to man-in-the-middle attacks thereby compromising confidentiality and integrity of data.

Action-Not Available
Vendor-Western Digital Corp.Sandisk Corp.
Product-sandisk_privateaccessPrivateAccess
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2022-45858
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-3.8||LOW
EPSS-0.08% / 24.01%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 21:26
Updated-22 Oct, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use of a weak cryptographic algorithm vulnerability [CWE-327] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.0 all versions, 8.8.0 all versions, 8.7.0 all versions may increase the chances of an attacker to have access to sensitive information or to perform man-in-the-middle attacks.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortinacFortiNAC
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2024-22463
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.4||HIGH
EPSS-0.11% / 30.63%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 13:18
Updated-08 Jan, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS 8.2.x through 9.6.0.x contains a use of a broken or risky cryptographic algorithm vulnerability. A remote unprivileged attacker could potentially exploit this vulnerability, leading to compromise of confidentiality and integrity of sensitive information

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2007-6755
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-5.8||MEDIUM
EPSS-0.52% / 65.65%
||
7 Day CHG~0.00%
Published-11 Oct, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.

Action-Not Available
Vendor-n/aDell Inc.
Product-bsafe_crypto-c-micro-editionbsafe_crypto-jn/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2020-13777
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.91% / 74.89%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 07:01
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

Action-Not Available
Vendor-n/aGNUCanonical Ltd.Debian GNU/LinuxFedora Project
Product-ubuntu_linuxgnutlsdebian_linuxfedoran/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2013-2233
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.37% / 57.97%
||
7 Day CHG~0.00%
Published-04 May, 2018 | 20:00
Updated-06 Aug, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-ansiblen/a
CWE ID-CWE-320
Not Available
CVE-2023-36749
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.4||HIGH
EPSS-0.08% / 25.08%
||
7 Day CHG~0.00%
Published-11 Jul, 2023 | 09:07
Updated-27 Nov, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The webserver of the affected devices support insecure TLS 1.0 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.

Action-Not Available
Vendor-Siemens AG
Product-ruggedcom_rox_mx5000reruggedcom_rox_rx1511ruggedcom_rox_rx1512_firmwareruggedcom_rox_rx1512ruggedcom_rox_mx5000_firmwareruggedcom_rox_rx1511_firmwareruggedcom_rox_rx1510ruggedcom_rox_rx1400_firmwareruggedcom_rox_rx1500_firmwareruggedcom_rox_rx1400ruggedcom_rox_rx1510_firmwareruggedcom_rox_rx1500ruggedcom_rox_rx1524_firmwareruggedcom_rox_rx5000ruggedcom_rox_rx1501ruggedcom_rox_rx1536ruggedcom_rox_mx5000ruggedcom_rox_rx1524ruggedcom_rox_rx1536_firmwareruggedcom_rox_mx5000re_firmwareruggedcom_rox_rx1501_firmwareruggedcom_rox_rx5000_firmwareRUGGEDCOM ROX MX5000RERUGGEDCOM ROX RX1511RUGGEDCOM ROX RX1536RUGGEDCOM ROX RX1400RUGGEDCOM ROX RX1501RUGGEDCOM ROX RX1500RUGGEDCOM ROX RX5000RUGGEDCOM ROX MX5000RUGGEDCOM ROX RX1524RUGGEDCOM ROX RX1510RUGGEDCOM ROX RX1512ruggedcom_rox_mx5000reruggedcom_rox_rx1524ruggedcom_rox_rx1400ruggedcom_rox_rx1501ruggedcom_rox_rx1500ruggedcom_rox_rx1511ruggedcom_rox_rx5000ruggedcom_rox_rx1512ruggedcom_rox_rx1536ruggedcom_rox_mx5000ruggedcom_rox_rx1510
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2022-29217
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.45% / 62.54%
||
7 Day CHG~0.00%
Published-24 May, 2022 | 14:10
Updated-23 Apr, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key confusion through non-blocklisted public key formats in PyJWT

PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has to be used. Users should upgrade to v2.4.0 to receive a patch for this issue. As a workaround, always be explicit with the algorithms that are accepted and expected when decoding.

Action-Not Available
Vendor-pyjwt_projectjpadillaFedora Project
Product-fedorapyjwtpyjwt
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-1543
Matching Score-4
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-4
Assigner-OpenSSL Software Foundation
CVSS Score-7.4||HIGH
EPSS-3.10% / 86.28%
||
7 Day CHG~0.00%
Published-06 Mar, 2019 | 21:00
Updated-16 Sep, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ChaCha20-Poly1305 with long nonces

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
  • Previous
  • 1
  • 2
  • Next
Details not found