Количество 3
Количество 3
CVE-2024-20301
A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.
GHSA-8cv6-h2pr-548g
A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.
BDU:2024-01922
Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Windows, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к уязвимому устройству
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-20301 A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions. | CVSS3: 6.2 | 0% Низкий | почти 2 года назад | |
GHSA-8cv6-h2pr-548g A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions. | CVSS3: 6.2 | 0% Низкий | почти 2 года назад | |
BDU:2024-01922 Уязвимость облачной платформы для защиты приложений от доступа несанкционированных пользователей и устройств Cisco Duo для Windows, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к уязвимому устройству | CVSS3: 6.2 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу