Логотип exploitDog
bind:CVE-2024-20301
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20301

Количество 3

Количество 3

nvd логотип

CVE-2024-20301

почти 2 года назад

A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-8cv6-h2pr-548g

почти 2 года назад

A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.

CVSS3: 6.2
EPSS: Низкий
fstec логотип

BDU:2024-01922

почти 2 года назад

Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Windows, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к уязвимому устройству

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20301

A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.

CVSS3: 6.2
0%
Низкий
почти 2 года назад
github логотип
GHSA-8cv6-h2pr-548g

A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.

CVSS3: 6.2
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-01922

Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Windows, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к уязвимому устройству

CVSS3: 6.2
0%
Низкий
почти 2 года назад

Уязвимостей на страницу