Lucene search

K
nvd[email protected]NVD:CVE-2023-20229
HistoryAug 16, 2023 - 10:15 p.m.

CVE-2023-20229

2023-08-1622:15:12
CWE-22
web.nvd.nist.gov
3
vulnerability
cryptoservice
cisco duo
windows
directory traversal
file overwriting
input validation

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

EPSS

0

Percentile

9.9%

A vulnerability in the CryptoService function of Cisco Duo Device Health Application for Windows could allow an authenticated, local attacker with low privileges to conduct directory traversal attacks and overwrite arbitrary files on an affected system.

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by executing a directory traversal attack on an affected host. A successful exploit could allow an attacker to use a cryptographic key to overwrite arbitrary files with SYSTEM-level privileges, resulting in a denial of service (DoS) condition or data loss on the affected system.

Affected configurations

Nvd
Node
ciscoduo_device_health_applicationRange5.0.05.2.0windows
VendorProductVersionCPE
ciscoduo_device_health_application*cpe:2.3:a:cisco:duo_device_health_application:*:*:*:*:*:windows:*:*

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

EPSS

0

Percentile

9.9%

Related for NVD:CVE-2023-20229