Количество 3
Количество 3
CVE-2024-20503
A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext.
GHSA-cx6w-h9jj-x2vr
A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext.
BDU:2024-07672
Уязвимость программного средства реализации двухфакторной аутентификации Cisco Duo Epic for Hyperdrive, связанная с недостаточной защитой служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-20503 A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-cx6w-h9jj-x2vr A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
BDU:2024-07672 Уязвимость программного средства реализации двухфакторной аутентификации Cisco Duo Epic for Hyperdrive, связанная с недостаточной защитой служебных данных, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу