Vulnslist

find the latest Cisco vulnerabilities

Cisco Duo Authentication Proxy Information Disclosure Vulnerability

cisco-sa-authproxlog-SxczXQ63 · Medium · Published · Updated

A vulnerability in the debug logging function of Cisco Duo Authentication Proxy could allow an authenticated, high-privileged, remote attacker to view sensitive information in a system log file. This vulnerability is due to insufficient masking of sensitive information before it is written to system log files. An attacker could exploit this vulnerability by accessing logs on an affected system. A successful exploit could allow the attacker to view sensitive information that should be restricted.  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco recommends that, after upgrading, customers delete log files from the system where the Cisco Duo Authentication Proxy application is installed and any other systems where logs may be stored. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-authproxlog-SxczXQ63

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2025-20345
Cisco Bug IDsCSCwq57269
CVSS ScoreBase 4.9
Base 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Duo Authentication Proxy

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2025-20345 Cisco OpenVuln
Cisco Meraki MS Series Switches CVE-2025-20345 Cisco OpenVuln
Cisco Duo Authentication Proxy CVE-2025-20345 Cisco OpenVuln
Cisco Duo CVE-2025-20345 Cisco OpenVuln