CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
9.6%
A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system.
This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | duo_authentication_for_epic | 1.0.0 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.0.0:*:*:*:*:*:*:* |
cisco | duo_authentication_for_epic | 1.0.1 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.0.1:*:*:*:*:*:*:* |
cisco | duo_authentication_for_epic | 1.1.9 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.9:*:*:*:*:*:*:* |
cisco | duo_authentication_for_epic | 1.1.10 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.10:*:*:*:*:*:*:* |
cisco | duo_authentication_for_epic | 1.1.13 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.13:*:*:*:*:*:*:* |
cisco | duo_authentication_for_epic | 1.2.0.95 | cpe:2.3:a:cisco:duo_authentication_for_epic:1.2.0.95:*:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Duo Authentication for Epic",
"versions": [
{
"version": "1.0.0",
"status": "affected"
},
{
"version": "1.0.1",
"status": "affected"
},
{
"version": "1.1.9",
"status": "affected"
},
{
"version": "1.1.10",
"status": "affected"
},
{
"version": "1.1.13",
"status": "affected"
},
{
"version": "1.2.0.95",
"status": "affected"
}
],
"defaultStatus": "unknown"
}
]