A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files.
This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 18 Jun 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Cisco Cisco ucs Central Software | |
| CPEs | cpe:2.3:a:cisco:ucs_central_software:1.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.1\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.2\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.3\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.4\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:1.5\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1j\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1m\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1n\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1o\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1p\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1q\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1r\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1s\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1t\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1u\):*:*:*:*:*:*:* | |
| Vendors & Products | Cisco Cisco ucs Central Software | 
Thu, 31 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-798 | 
Wed, 16 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 16 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key. | |
| Title | Cisco UCS Central Software Configuration Backup Static Key Vulnerability | |
| Weaknesses | CWE-321 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cisco
Published: 2024-10-16T16:15:37.008Z
Updated: 2024-10-31T14:13:19.791Z
Reserved: 2023-11-08T15:08:07.626Z
Link: CVE-2024-20280
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-10-16T18:30:50.106Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-10-16T17:15:13.697
Modified: 2025-06-18T18:28:53.347
Link: CVE-2024-20280
 Redhat
                        Redhat
                    No data.