CVE-2023-20123
MEDIUMCisco Duo - Info Disclosure
Title source: llmDescription
A vulnerability in the offline access mode of Cisco Duo Two-Factor Authentication for macOS and Duo Authentication for Windows Logon and RDP could allow an unauthenticated, physical attacker to replay valid user session credentials and gain unauthorized access to an affected macOS or Windows device. This vulnerability exists because session credentials do not properly expire. An attacker could exploit this vulnerability by replaying previously used multifactor authentication (MFA) codes to bypass MFA protection. A successful exploit could allow the attacker to gain unauthorized access to the affected device.
Scores
CVSS v3
6.3
EPSS
0.0002
EPSS Percentile
5.6%
Attack Vector
PHYSICAL
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Classification
CWE
CWE-294
Status
published
Affected Products (2)
cisco/duo
< 2.0.1
cisco/duo_authentication_for_windows_logon_and_rdp
< 4.2.2
Timeline
Published
Apr 05, 2023
Tracked Since
Feb 18, 2026