Логотип exploitDog
bind:CVE-2023-20199
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20199

Количество 3

Количество 3

nvd логотип

CVE-2023-20199

больше 2 лет назад

A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary authentication and access an affected macOS device. This vulnerability is due to the incorrect handling of responses from Cisco Duo when the application is configured to fail open. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permission.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-mggg-vw4x-89wv

больше 2 лет назад

A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary authentication and access an affected macOS device. This vulnerability is due to the incorrect handling of responses from Cisco Duo when the application is configured to fail open. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permission.

CVSS3: 6.2
EPSS: Низкий
fstec логотип

BDU:2023-03530

больше 2 лет назад

Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Mac OS, позволяющая нарушителю обойти процесс аутентификации и получить несанкционированный доступ к устройству

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20199

A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary authentication and access an affected macOS device. This vulnerability is due to the incorrect handling of responses from Cisco Duo when the application is configured to fail open. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permission.

CVSS3: 6.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-mggg-vw4x-89wv

A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary authentication and access an affected macOS device. This vulnerability is due to the incorrect handling of responses from Cisco Duo when the application is configured to fail open. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permission.

CVSS3: 6.2
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03530

Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Mac OS, позволяющая нарушителю обойти процесс аутентификации и получить несанкционированный доступ к устройству

CVSS3: 6.2
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу