A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-06-03T00:00:00
Updated: 2020-06-03T17:56:22
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3281
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-03T18:15:22.167
Modified: 2020-06-11T20:34:44.133
Link: CVE-2020-3281
JSON object: View
Redhat Information
No data.
CWE