A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files.
This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Jun 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco ucs Central Software |
|
CPEs | cpe:2.3:a:cisco:ucs_central_software:1.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1j\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1m\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1n\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1o\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1p\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1q\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1r\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1s\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1t\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1u\):*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco ucs Central Software |
Thu, 31 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 |
Wed, 16 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Oct 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key. | |
Title | Cisco UCS Central Software Configuration Backup Static Key Vulnerability | |
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-31T14:13:19.791Z
Reserved: 2023-11-08T15:08:07.626Z
Link: CVE-2024-20280

Updated: 2024-10-16T18:30:50.106Z

Status : Analyzed
Published: 2024-10-16T17:15:13.697
Modified: 2025-06-18T18:28:53.347
Link: CVE-2024-20280

No data.