<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2023-20185 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2023-20185/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2023-20185/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-aci-cloudsec/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-aci-cloudsec/</guid><description>A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.</description><content:encoded><![CDATA[<p>A vulnerability exists within the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches when operating in ACI mode. This flaw enables an unauthenticated, remote adversary to potentially decipher and manipulate encrypted traffic traversing between sites. The vulnerability, identified as CVE-2023-20185, originates from an issue in the cipher implementation employed by the CloudSec encryption feature. Cisco has deprecated and removed the affected ACI Multi-Site CloudSec encryption feature.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a network position on-path between ACI sites.</li>
<li>The attacker intercepts intersite encrypted traffic.</li>
<li>The attacker analyzes the captured traffic.</li>
<li>The attacker exploits the weak cipher implementation.</li>
<li>The attacker decrypts the intercepted traffic.</li>
<li>The attacker reads sensitive data within the decrypted traffic.</li>
<li>The attacker modifies the decrypted traffic.</li>
<li>The attacker re-encrypts (or forwards unencrypted) the modified traffic toward the destination.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-20185 allows unauthorized reading and modification of data transmitted between ACI sites. The impact can range from data breaches and intellectual property theft to manipulated financial transactions and compromised control systems. The lack of a workaround necessitates immediate action to mitigate the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply configuration changes to remove usage of the CloudSec encryption feature.</li>
<li>Monitor network traffic for unusual patterns indicative of man-in-the-middle attacks targeting intersite communication.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts targeting intersite traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2023-20185</category><category>information-disclosure</category><category>network</category></item></channel></rss>