Cisco Duo Authentication Proxy Information Disclosure Vulnerability

🚨 SEVERITY: MEDIUM — CVSS 4.9 Security Advisory

TL;DR 📌

A medium-severity information disclosure vulnerability has been identified in the Cisco Duo Authentication Proxy. This flaw allows authenticated, high-privileged remote attackers to view sensitive information in system log files. There are no workarounds available, and users are advised to upgrade to fixed software versions.

What happened 🕵️‍♂️

A vulnerability in the debug logging function of the Cisco Duo Authentication Proxy could allow an authenticated, high-privileged remote attacker to access sensitive information that is inadequately masked in system log files. This could lead to unauthorized disclosure of sensitive data, which should remain restricted. Cisco has released software updates to address this vulnerability.

Affected products 🖥️

The vulnerability affects the following versions of Cisco Duo Authentication Proxy:

  • 5.8.2 and earlier
  • 6.5.1 and earlier

Fixed software 🔧

Upgrade to the first fixed release in your train (or later):

Release / Product First Fixed Release Notes
5.8.2 and earlier Migrate to a fixed release.
6.5.1 and earlier 6.5.2
1.0 Initial public release.
Cisco Duo Authentication Proxy 6.5.2 5.8.2 and earlier, 6.5.1 and earlier

Workarounds 🧯

There are no workarounds available to address this vulnerability. Cisco recommends deleting log files from the system where the Cisco Duo Authentication Proxy is installed and any other systems where logs may be stored after upgrading.

Risk in context 🎯

With a CVSS score of 4.9, this vulnerability is classified as medium severity. While it requires high privileges for exploitation, the risk of sensitive information exposure remains significant, particularly for organizations that rely on the Duo Authentication Proxy for secure access management.

Fast facts ⚡

  • Vulnerability: Information Disclosure in Cisco Duo Authentication Proxy
  • CVSS Score: 4.9 (Medium)
  • Exploitation: Requires authenticated, high-privileged access
  • Impact: Sensitive information exposure in log files
  • Workarounds: None available

For leadership 🧭

This vulnerability poses a medium risk to our organization due to the potential exposure of sensitive information through system logs. It requires authenticated, high-privileged access, which somewhat limits the threat landscape but does not eliminate it entirely. Immediate action is required to mitigate this risk:

  • Remediation ask: Patch affected systems within 7 days.
  • Operational impact: Brief maintenance window expected; no configuration drift anticipated.

Now: Identify affected systems and plan for upgrades.
Next: Implement the recommended patches.
Later: Monitor logs for any unauthorized access attempts and review logging practices to enhance security.