Search criteria
226 vulnerabilities found for asyncos by cisco
FKIE_CVE-2020-3122
Vulnerability from fkie_nvd - Published: 2025-03-04 19:15 - Updated: 2025-07-31 19:44
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.0.0-128:*:*:*:*:*:*:*",
"matchCriteriaId": "BADF6D45-FDBE-42A7-A915-0DDD8FBC64F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto no autenticado obtenga informaci\u00f3n confidencial de la red."
}
],
"id": "CVE-2020-3122",
"lastModified": "2025-07-31T19:44:34.333",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-03-04T19:15:36.890",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-20184
Vulnerability from fkie_nvd - Published: 2025-02-05 17:15 - Updated: 2025-08-08 17:11
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
"matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
"matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
"matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
"matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
"matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*",
"matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.3-022:*:*:*:*:*:*:*",
"matchCriteriaId": "D72D8A34-34BF-4390-B244-23AEAC08ACD5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*",
"matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
"matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
"matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
"matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*",
"matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*",
"matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*",
"matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*",
"matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*",
"matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
"matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*",
"matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*",
"matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
"matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*",
"matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*",
"matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*",
"matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*",
"matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
"matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
"matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*",
"matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
"matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
"matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
"matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
"matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-004:*:*:*:*:*:*:*",
"matchCriteriaId": "8E7D1E25-9E12-451F-A454-78560153CF86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
"matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
"matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.1-011:*:*:*:*:*:*:*",
"matchCriteriaId": "F5784365-ACFB-4391-99C2-8B5B525039B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n de comandos contra un dispositivo afectado. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los archivos de configuraci\u00f3n XML por parte de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo de configuraci\u00f3n XML manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante inyectar comandos al sistema operativo subyacente con privilegios de superusuario."
}
],
"id": "CVE-2025-20184",
"lastModified": "2025-08-08T17:11:23.557",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-02-05T17:15:25.697",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20183
Vulnerability from fkie_nvd - Published: 2025-02-05 17:15 - Updated: 2025-08-05 19:28
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*",
"matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
"matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
"matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
"matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*",
"matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*",
"matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*",
"matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*",
"matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*",
"matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
"matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*",
"matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*",
"matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
"matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*",
"matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*",
"matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*",
"matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*",
"matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
"matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
"matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*",
"matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
"matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
"matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
"matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
"matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
"matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
"matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance."
},
{
"lang": "es",
"value": "Una vulnerabilidad en una implementaci\u00f3n basada en pol\u00edticas de Cisco Application Visibility and Control (AVC) de Cisco AsyncOS Software para Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto no autenticado eluda el esc\u00e1ner antivirus y descargue un archivo malicioso en un endpoint. La vulnerabilidad se debe a una gesti\u00f3n inadecuada de un encabezado de solicitud de rango manipulado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP con un encabezado de solicitud de rango manipulado a trav\u00e9s del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante eluda el esc\u00e1ner antivirus y descargue malware en el endpoint sin que Cisco Secure Web Appliance lo detecte."
}
],
"id": "CVE-2025-20183",
"lastModified": "2025-08-05T19:28:30.367",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-02-05T17:15:25.527",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20185
Vulnerability from fkie_nvd - Published: 2025-02-05 17:15 - Updated: 2025-08-06 16:53
Severity ?
3.4 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.
Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
"matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
"matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
"matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
"matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
"matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*",
"matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n de la funcionalidad de acceso remoto de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante local autenticado eleve los privilegios a superusuario. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una falla arquitect\u00f3nica en el algoritmo de generaci\u00f3n de contrase\u00f1as para la funcionalidad de acceso remoto. Un atacante podr\u00eda explotar esta vulnerabilidad generando una contrase\u00f1a temporal para la cuenta de servicio. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios como superusuario y acceder al sistema operativo subyacente. Nota: La calificaci\u00f3n de impacto de seguridad (SIR) para esta vulnerabilidad es media debido al alcance ilimitado de la informaci\u00f3n a la que puede acceder un atacante."
}
],
"id": "CVE-2025-20185",
"lastModified": "2025-08-06T16:53:52.867",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-02-05T17:15:25.883",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-250"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-20180
Vulnerability from fkie_nvd - Published: 2025-02-05 17:15 - Updated: 2025-08-15 20:36
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*",
"matchCriteriaId": "80439833-447F-4582-B1FA-278306ABFE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*",
"matchCriteriaId": "29CB6A5B-34EE-4958-ACB5-6433E8C0014D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-249:*:*:*:*:*:*:*",
"matchCriteriaId": "9332990D-7532-4CE6-A02B-81B9445C09F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*",
"matchCriteriaId": "C18D9472-A7E4-4083-9369-DBA97A40022B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.6.1-201:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1F8E93-E5CF-4C73-BFFA-2B3DB2C764BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-023:*:*:*:*:*:*:*",
"matchCriteriaId": "86750D2A-0D2D-4775-B7B6-261337F3F72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1365DA-3163-4CFF-9F48-1998C9F6A29B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-052:*:*:*:*:*:*:*",
"matchCriteriaId": "4D26ED91-0192-4606-B304-2BD926A4E854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5B0C94-A72F-4B5A-A9F8-00EF60D6C001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*",
"matchCriteriaId": "74C14467-2836-4FDF-8B4B-670D08511614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*",
"matchCriteriaId": "E50DAB07-5582-47C8-A0B0-7C0DA63DC70A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*",
"matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-203:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9CA168-015D-4962-BB8D-E5BB10925D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*",
"matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*",
"matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*",
"matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*",
"matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*",
"matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-005:*:*:*:*:*:*:*",
"matchCriteriaId": "F571B6DA-9940-4B08-8A7F-7A4B0B36ACB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-195:*:*:*:*:*:*:*",
"matchCriteriaId": "5B49B71D-89F0-40B0-B93F-2C038583C367",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
"matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
"matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
"matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
"matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
"matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*",
"matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-050:*:*:*:*:*:*:*",
"matchCriteriaId": "4C829294-B71F-4201-8BF0-623D45E93C7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-054:*:*:*:*:*:*:*",
"matchCriteriaId": "7176E776-01D3-432F-BD8C-38B15AAF62F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager y Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales v\u00e1lidas para una cuenta de usuario con al menos el rol de Operador."
}
],
"id": "CVE-2025-20180",
"lastModified": "2025-08-15T20:36:40.760",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-02-05T17:15:25.370",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-1425
Vulnerability from fkie_nvd - Published: 2024-11-18 16:15 - Updated: 2025-08-11 17:32
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC0CD03-0E5A-44FE-A973-B658537B2AAF",
"versionEndExcluding": "13.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F73AEFE-EAC5-4E2D-AECD-B1D5DE7B0029",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24206121-4F6F-4268-B1F4-41974596C657",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDCAB99-22C9-41B2-B981-06F7911CB2F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89795801-953E-4D11-8F86-4394DD4582AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14B41A69-AFB0-4770-A8F4-82393F5B330F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3582C8AF-36B0-49C4-9951-3D3745D38C15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF84B5E-64EE-4F31-BD99-C869DA3C73E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEF3CE3-2A24-42CB-B73E-A6C6333A93E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32E54E9E-6FCA-4951-9162-35F9F57B6856",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad existe porque se incluye informaci\u00f3n confidencial en las solicitudes HTTP que se intercambian entre el usuario y el dispositivo. Un atacante podr\u00eda aprovechar esta vulnerabilidad al observar las solicitudes HTTP sin procesar que se env\u00edan a la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as que se configuran en toda la interfaz. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
}
],
"id": "CVE-2021-1425",
"lastModified": "2025-08-11T17:32:43.827",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-11-18T16:15:10.180",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-201"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2022-20871
Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-08-11 17:44
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asyncos | 12.5.1-011 | |
| cisco | asyncos | 12.5.2-007 | |
| cisco | asyncos | 12.5.2-011 | |
| cisco | asyncos | 12.5.3-002 | |
| cisco | asyncos | 12.5.4-005 | |
| cisco | asyncos | 12.5.4-011 | |
| cisco | asyncos | 14.0.2-012 | |
| cisco | asyncos | 14.1.0-032 | |
| cisco | asyncos | 14.1.0-041 | |
| cisco | asyncos | 14.1.0-047 | |
| cisco | asyncos | 14.5.0-498 | |
| cisco | secure_web_appliance_virtual_s1000v | - | |
| cisco | secure_web_appliance_virtual_s100v | - | |
| cisco | secure_web_appliance_virtual_s300v | - | |
| cisco | secure_web_appliance_virtual_s600v | - | |
| cisco | secure_web_appliance_s196 | - | |
| cisco | secure_web_appliance_s396 | - | |
| cisco | secure_web_appliance_s696 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
"matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
"matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
"matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de Cisco\u0026#xa0;AsyncOS para Cisco\u0026#xa0;Secure Web Appliance, anteriormente Cisco\u0026#xa0;Web Security Appliance (WSA),\u0026#xa0;podr\u00eda permitir que un atacante remoto autenticado realice una inyecci\u00f3n de comandos y eleve los privilegios a superusuario. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la interfaz web. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el sistema y enviando un paquete HTTP dise\u00f1ado al dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a superusuario. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de solo lectura. Cisco\u0026#xa0;ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad. Atenci\u00f3n: la simplificaci\u00f3n de la cartera de Cisco incluye el cambio de nombre de los productos de seguridad bajo una sola marca: Cisco\u0026#xa0;Secure. Para obtener m\u00e1s informaci\u00f3n, consulte."
}
],
"id": "CVE-2022-20871",
"lastModified": "2025-08-11T17:44:07.837",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-11-15T16:15:23.757",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Not Applicable"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU"
},
{
"source": "psirt@cisco.com",
"tags": [
"Not Applicable"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-20504
Vulnerability from fkie_nvd - Published: 2024-11-06 17:15 - Updated: 2025-08-07 19:08
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
"matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
"matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
"matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
"matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
"matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*",
"matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*",
"matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*",
"matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*",
"matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*",
"matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*",
"matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*",
"matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
"matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
"matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
"matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
"matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
"matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
"matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
"matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
"matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Secure Email Gateway y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador."
}
],
"id": "CVE-2024-20504",
"lastModified": "2025-08-07T19:08:29.290",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2024-11-06T17:15:16.053",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-80"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-20429
Vulnerability from fkie_nvd - Published: 2024-07-17 17:15 - Updated: 2025-08-08 01:56
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asyncos | 11.0.3-238 | |
| cisco | asyncos | 11.1.0-069 | |
| cisco | asyncos | 11.1.0-128 | |
| cisco | asyncos | 11.1.0-131 | |
| cisco | asyncos | 12.0.0-419 | |
| cisco | asyncos | 12.1.0-071 | |
| cisco | asyncos | 12.1.0-087 | |
| cisco | asyncos | 12.1.0-089 | |
| cisco | asyncos | 12.5.0-066 | |
| cisco | asyncos | 12.5.3-041 | |
| cisco | asyncos | 12.5.4-041 | |
| cisco | asyncos | 13.0.0-392 | |
| cisco | asyncos | 13.0.5-007 | |
| cisco | asyncos | 13.5.1-277 | |
| cisco | asyncos | 13.5.4-038 | |
| cisco | asyncos | 14.0.0-698 | |
| cisco | asyncos | 14.2.0-620 | |
| cisco | asyncos | 14.2.1-020 | |
| cisco | secure_email_gateway_virtual_appliance_c100v | - | |
| cisco | secure_email_gateway_virtual_appliance_c300v | - | |
| cisco | secure_email_gateway_virtual_appliance_c600v | - | |
| cisco | secure_email_gateway_c195 | - | |
| cisco | secure_email_gateway_c395 | - | |
| cisco | secure_email_gateway_c695 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*",
"matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*",
"matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*",
"matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*",
"matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*",
"matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*",
"matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*",
"matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*",
"matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*",
"matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
"matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de operador v\u00e1lidas."
}
],
"id": "CVE-2024-20429",
"lastModified": "2025-08-08T01:56:39.500",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-07-17T17:15:14.497",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-20435
Vulnerability from fkie_nvd - Published: 2024-07-17 17:15 - Updated: 2025-08-08 01:55
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asyncos | 11.7.0-406 | |
| cisco | asyncos | 11.7.0-418 | |
| cisco | asyncos | 11.7.1-006 | |
| cisco | asyncos | 11.7.1-020 | |
| cisco | asyncos | 11.7.1-049 | |
| cisco | asyncos | 11.7.2-011 | |
| cisco | asyncos | 11.8.0-414 | |
| cisco | asyncos | 11.8.1-023 | |
| cisco | asyncos | 11.8.3-018 | |
| cisco | asyncos | 11.8.3-021 | |
| cisco | asyncos | 12.0.1-268 | |
| cisco | asyncos | 12.0.3-007 | |
| cisco | asyncos | 12.5.1-011 | |
| cisco | asyncos | 12.5.2-007 | |
| cisco | asyncos | 12.5.4-005 | |
| cisco | asyncos | 12.5.5-004 | |
| cisco | asyncos | 12.5.6-008 | |
| cisco | asyncos | 14.0.2-012 | |
| cisco | asyncos | 14.0.3-014 | |
| cisco | asyncos | 14.0.4-005 | |
| cisco | asyncos | 14.0.5-007 | |
| cisco | asyncos | 14.5.0-498 | |
| cisco | asyncos | 14.5.1-016 | |
| cisco | asyncos | 14.5.2-011 | |
| cisco | asyncos | 15.0.0-322 | |
| cisco | asyncos | 15.0.0-355 | |
| cisco | asyncos | 15.1.0-287 | |
| cisco | secure_web_appliance_virtual_s1000v | - | |
| cisco | secure_web_appliance_virtual_s100v | - | |
| cisco | secure_web_appliance_virtual_s300v | - | |
| cisco | secure_web_appliance_virtual_s600v | - | |
| cisco | secure_web_appliance_s196 | - | |
| cisco | secure_web_appliance_s396 | - | |
| cisco | secure_web_appliance_s696 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*",
"matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*",
"matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*",
"matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*",
"matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
"matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
"matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
"matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
"matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
"matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
"matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
"matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
"matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
"matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
"matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
"matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco AsyncOS para Secure Web Appliance podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios y eleve privilegios a root. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la CLI. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en el sistema y ejecutando un comando manipulado en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de invitado."
}
],
"id": "CVE-2024-20435",
"lastModified": "2025-08-08T01:55:41.180",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-07-17T17:15:14.787",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-250"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
CVE-2020-3122 (GCVE-0-2020-3122)
Vulnerability from cvelistv5 – Published: 2025-03-04 18:22 – Updated: 2025-03-04 18:27
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information.
Severity ?
5.3 (Medium)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco IronPort Security Management Appliance |
Affected:
N/A
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3122",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-04T18:26:53.334394Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T18:27:11.025Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IronPort Security Management Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.0.0(Ritz)-128"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"format": "cvssV3_0"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T18:22:12.411Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "CSCvr92383",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383"
}
],
"source": {
"advisory": "",
"defects": [
"CSCvr92383"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Content Security Management Appliance Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3122",
"datePublished": "2025-03-04T18:22:12.411Z",
"dateReserved": "2019-12-12T00:00:00.000Z",
"dateUpdated": "2025-03-04T18:27:11.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20185 (GCVE-0-2025-20185)
Vulnerability from cvelistv5 – Published: 2025-02-05 16:14 – Updated: 2025-02-05 16:59
VLAI?
Summary
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.
Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 15.0.3-002 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20185",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T16:59:20.922545Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:59:47.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "15.0.3-002"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "13.6.2-023"
},
{
"status": "affected",
"version": "13.6.2-078"
},
{
"status": "affected",
"version": "13.0.0-249"
},
{
"status": "affected",
"version": "13.0.0-277"
},
{
"status": "affected",
"version": "13.8.1-052"
},
{
"status": "affected",
"version": "13.8.1-068"
},
{
"status": "affected",
"version": "13.8.1-074"
},
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "12.8.1-002"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "13.6.1-201"
},
{
"status": "affected",
"version": "14.2.0-203"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "12.8.1-021"
},
{
"status": "affected",
"version": "13.8.1-108"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
},
{
"status": "affected",
"version": "15.5.2-005"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "15.0.1-004"
},
{
"status": "affected",
"version": "15.2.1-011"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "Execution with Unnecessary Privileges",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:38.541Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"defects": [
"CSCwk70576"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20185",
"datePublished": "2025-02-05T16:14:38.541Z",
"dateReserved": "2024-10-10T19:15:13.226Z",
"dateUpdated": "2025-02-05T16:59:47.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20184 (GCVE-0-2025-20184)
Vulnerability from cvelistv5 – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:00
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Severity ?
6.5 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 15.0.3-002 Affected: 15.5.3-022 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20184",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T16:59:57.945223Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:00:15.021Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "15.0.3-002"
},
{
"status": "affected",
"version": "15.5.3-022"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "15.0.1-004"
},
{
"status": "affected",
"version": "15.2.1-011"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:30.863Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"defects": [
"CSCwk70559"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager and Secure Web Appliance Command Injection Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20184",
"datePublished": "2025-02-05T16:14:30.863Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:00:15.021Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20183 (GCVE-0-2025-20183)
Vulnerability from cvelistv5 – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:00
VLAI?
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Severity ?
5.8 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
11.8.0-453
Affected: 12.5.3-002 Affected: 12.0.3-007 Affected: 12.0.3-005 Affected: 14.1.0-032 Affected: 14.1.0-047 Affected: 14.1.0-041 Affected: 12.0.4-002 Affected: 14.0.2-012 Affected: 11.8.0-414 Affected: 12.0.1-268 Affected: 11.8.1-023 Affected: 11.8.3-021 Affected: 11.8.3-018 Affected: 12.5.1-011 Affected: 11.8.4-004 Affected: 12.5.2-007 Affected: 12.5.2-011 Affected: 14.5.0-498 Affected: 12.5.4-005 Affected: 12.5.4-011 Affected: 12.0.5-011 Affected: 14.0.3-014 Affected: 12.5.5-004 Affected: 12.5.5-005 Affected: 12.5.5-008 Affected: 14.0.4-005 Affected: 14.5.1-008 Affected: 14.5.1-016 Affected: 15.0.0-355 Affected: 15.0.0-322 Affected: 12.5.6-008 Affected: 15.1.0-287 Affected: 14.5.2-011 Affected: 15.2.0-116 Affected: 14.0.5-007 Affected: 15.2.0-164 Affected: 14.5.1-510 Affected: 12.0.2-012 Affected: 12.0.2-004 Affected: 14.5.1-607 Affected: 14.5.3-033 Affected: 14.5.0-673 Affected: 14.5.0-537 Affected: 12.0.1-334 Affected: 14.0.1-503 Affected: 14.0.1-053 Affected: 11.8.0-429 Affected: 14.0.1-040 Affected: 14.0.1-014 Affected: 12.5.1-043 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20183",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T17:00:32.365680Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:00:50.686Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:21.787Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-swa-range-bypass-2BsEHYSu",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu"
}
],
"source": {
"advisory": "cisco-sa-swa-range-bypass-2BsEHYSu",
"defects": [
"CSCwk58287"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Web Appliance Range Request Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20183",
"datePublished": "2025-02-05T16:14:21.787Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:00:50.686Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20180 (GCVE-0-2025-20180)
Vulnerability from cvelistv5 – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:20
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
Severity ?
4.8 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 16.0.0-050 Affected: 15.0.3-002 Affected: 16.0.0-054 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20180",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T17:20:31.169165Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:20:45.616Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "16.0.0-050"
},
{
"status": "affected",
"version": "15.0.3-002"
},
{
"status": "affected",
"version": "16.0.0-054"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "13.6.2-023"
},
{
"status": "affected",
"version": "13.6.2-078"
},
{
"status": "affected",
"version": "13.0.0-249"
},
{
"status": "affected",
"version": "13.0.0-277"
},
{
"status": "affected",
"version": "13.8.1-052"
},
{
"status": "affected",
"version": "13.8.1-068"
},
{
"status": "affected",
"version": "13.8.1-074"
},
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "12.8.1-002"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "13.6.1-201"
},
{
"status": "affected",
"version": "14.2.0-203"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "12.8.1-021"
},
{
"status": "affected",
"version": "13.8.1-108"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
},
{
"status": "affected",
"version": "15.5.2-005"
},
{
"status": "affected",
"version": "16.0.0-195"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:11.746Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-xss-WCk2WcuG",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-xss-WCk2WcuG",
"defects": [
"CSCwn25954"
],
"discovery": "INTERNAL"
},
"title": "Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20180",
"datePublished": "2025-02-05T16:14:11.746Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:20:45.616Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-1425 (GCVE-0-2021-1425)
Vulnerability from cvelistv5 – Published: 2024-11-18 15:36 – Updated: 2024-11-18 15:58
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Severity ?
CWE
- CWE-201 - Exposure of Sensitive Information Through Sent Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Email and Web Manager |
Affected:
N/A
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1425",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-18T15:58:03.148324Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:58:19.973Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-201",
"description": "Exposure of Sensitive Information Through Sent Data",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:36:48.271Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"defects": [
"CSCvw39308"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Cisco Email Security Appliance and Content Security Management Appliance Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1425",
"datePublished": "2024-11-18T15:36:48.271Z",
"dateReserved": "2020-11-13T00:00:00.000Z",
"dateUpdated": "2024-11-18T15:58:19.973Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20871 (GCVE-0-2022-20871)
Vulnerability from cvelistv5 – Published: 2024-11-15 15:27 – Updated: 2024-11-15 15:35
VLAI?
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
Severity ?
6.3 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
12.5.3-002
Affected: 14.1.0-032 Affected: 14.1.0-047 Affected: 14.1.0-041 Affected: 14.0.2-012 Affected: 12.5.1-011 Affected: 12.5.2-007 Affected: 12.5.2-011 Affected: 14.5.0-498 Affected: 12.5.4-005 Affected: 12.5.4-011 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20871",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T15:35:06.319558Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:35:23.825Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:27:14.028Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-wsa-prv-esc-8PdRU8t8",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv"
}
],
"source": {
"advisory": "cisco-sa-wsa-prv-esc-8PdRU8t8",
"defects": [
"CSCwb92675"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20871",
"datePublished": "2024-11-15T15:27:14.028Z",
"dateReserved": "2021-11-02T13:28:29.183Z",
"dateUpdated": "2024-11-15T15:35:23.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20504 (GCVE-0-2024-20504)
Vulnerability from cvelistv5 – Published: 2024-11-06 16:29 – Updated: 2024-11-06 17:05
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity ?
5.4 (Medium)
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 14.2.0-620 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20504",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-06T17:05:32.372312Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T17:05:40.097Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "14.1.0-223"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T16:29:37.791Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n"
}
],
"source": {
"advisory": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
"defects": [
"CSCwj72814"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20504",
"datePublished": "2024-11-06T16:29:37.791Z",
"dateReserved": "2023-11-08T15:08:07.687Z",
"dateUpdated": "2024-11-06T17:05:40.097Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20429 (GCVE-0-2024-20429)
Vulnerability from cvelistv5 – Published: 2024-07-17 16:29 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
Severity ?
6.5 (Medium)
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
11.0.3-238
Affected: 11.1.0-069 Affected: 11.1.0-131 Affected: 11.1.0-128 Affected: 12.0.0-419 Affected: 12.1.0-071 Affected: 12.1.0-087 Affected: 12.1.0-089 Affected: 13.0.0-392 Affected: 13.0.5-007 Affected: 13.5.1-277 Affected: 13.5.4-038 Affected: 12.5.0-066 Affected: 12.5.4-041 Affected: 12.5.3-041 Affected: 14.0.0-698 Affected: 14.2.0-620 Affected: 14.2.1-020 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "secure_email",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-18T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-19T03:55:39.760Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:41.996Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T16:29:18.884Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"source": {
"advisory": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"defects": [
"CSCwf61949"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20429",
"datePublished": "2024-07-17T16:29:18.884Z",
"dateReserved": "2023-11-08T15:08:07.666Z",
"dateUpdated": "2024-08-01T21:59:41.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20435 (GCVE-0-2024-20435)
Vulnerability from cvelistv5 – Published: 2024-07-17 16:27 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
Severity ?
8.8 (High)
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
11.7.0-406
Affected: 11.7.0-418 Affected: 11.7.1-049 Affected: 11.7.1-006 Affected: 11.7.1-020 Affected: 11.7.2-011 Affected: 11.8.0-414 Affected: 11.8.1-023 Affected: 11.8.3-018 Affected: 11.8.3-021 Affected: 12.0.1-268 Affected: 12.0.3-007 Affected: 12.5.2-007 Affected: 12.5.1-011 Affected: 12.5.4-005 Affected: 12.5.5-004 Affected: 12.5.6-008 Affected: 14.5.0-498 Affected: 14.5.1-016 Affected: 14.5.2-011 Affected: 14.0.3-014 Affected: 14.0.2-012 Affected: 14.0.4-005 Affected: 14.0.5-007 Affected: 15.0.0-322 Affected: 15.0.0-355 Affected: 15.1.0-287 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:cisco:secure_web_appliance:11.7.0-406:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.0-418:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-006:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-020:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-049:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.2-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.0-414:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.1-023:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.3-018:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.3-021:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.0.1-268:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.0.3-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.1-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.2-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.4-005:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.5-004:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.6-008:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.2-012:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.3-014:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.4-005:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.5-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.0-498:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.1-016:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.2-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.0.0-322:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.0.0-355:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.1.0-287:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "secure_web_appliance",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "11.7.0-406"
},
{
"status": "affected",
"version": "11.7.0-418"
},
{
"status": "affected",
"version": "11.7.1-006"
},
{
"status": "affected",
"version": "11.7.1-020"
},
{
"status": "affected",
"version": "11.7.1-049"
},
{
"status": "affected",
"version": "11.7.2-011"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.1.0-287"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T17:15:02.287832Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T17:28:04.667Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:42.297Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-swa-priv-esc-7uHpZsCC",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.7.0-406"
},
{
"status": "affected",
"version": "11.7.0-418"
},
{
"status": "affected",
"version": "11.7.1-049"
},
{
"status": "affected",
"version": "11.7.1-006"
},
{
"status": "affected",
"version": "11.7.1-020"
},
{
"status": "affected",
"version": "11.7.2-011"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.1.0-287"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "Execution with Unnecessary Privileges",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T16:27:59.858Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-swa-priv-esc-7uHpZsCC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
}
],
"source": {
"advisory": "cisco-sa-swa-priv-esc-7uHpZsCC",
"defects": [
"CSCwj30015"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20435",
"datePublished": "2024-07-17T16:27:59.858Z",
"dateReserved": "2023-11-08T15:08:07.667Z",
"dateUpdated": "2024-08-01T21:59:42.297Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3122 (GCVE-0-2020-3122)
Vulnerability from nvd – Published: 2025-03-04 18:22 – Updated: 2025-03-04 18:27
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information.
Severity ?
5.3 (Medium)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco IronPort Security Management Appliance |
Affected:
N/A
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3122",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-04T18:26:53.334394Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T18:27:11.025Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IronPort Security Management Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.0.0(Ritz)-128"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"format": "cvssV3_0"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T18:22:12.411Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "CSCvr92383",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383"
}
],
"source": {
"advisory": "",
"defects": [
"CSCvr92383"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Content Security Management Appliance Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3122",
"datePublished": "2025-03-04T18:22:12.411Z",
"dateReserved": "2019-12-12T00:00:00.000Z",
"dateUpdated": "2025-03-04T18:27:11.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20185 (GCVE-0-2025-20185)
Vulnerability from nvd – Published: 2025-02-05 16:14 – Updated: 2025-02-05 16:59
VLAI?
Summary
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.
Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 15.0.3-002 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20185",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T16:59:20.922545Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:59:47.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "15.0.3-002"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "13.6.2-023"
},
{
"status": "affected",
"version": "13.6.2-078"
},
{
"status": "affected",
"version": "13.0.0-249"
},
{
"status": "affected",
"version": "13.0.0-277"
},
{
"status": "affected",
"version": "13.8.1-052"
},
{
"status": "affected",
"version": "13.8.1-068"
},
{
"status": "affected",
"version": "13.8.1-074"
},
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "12.8.1-002"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "13.6.1-201"
},
{
"status": "affected",
"version": "14.2.0-203"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "12.8.1-021"
},
{
"status": "affected",
"version": "13.8.1-108"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
},
{
"status": "affected",
"version": "15.5.2-005"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "15.0.1-004"
},
{
"status": "affected",
"version": "15.2.1-011"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "Execution with Unnecessary Privileges",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:38.541Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"defects": [
"CSCwk70576"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20185",
"datePublished": "2025-02-05T16:14:38.541Z",
"dateReserved": "2024-10-10T19:15:13.226Z",
"dateUpdated": "2025-02-05T16:59:47.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20184 (GCVE-0-2025-20184)
Vulnerability from nvd – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:00
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Severity ?
6.5 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 15.0.3-002 Affected: 15.5.3-022 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20184",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T16:59:57.945223Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:00:15.021Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "15.0.3-002"
},
{
"status": "affected",
"version": "15.5.3-022"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "15.0.1-004"
},
{
"status": "affected",
"version": "15.2.1-011"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:30.863Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
"defects": [
"CSCwk70559"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager and Secure Web Appliance Command Injection Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20184",
"datePublished": "2025-02-05T16:14:30.863Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:00:15.021Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20183 (GCVE-0-2025-20183)
Vulnerability from nvd – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:00
VLAI?
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Severity ?
5.8 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
11.8.0-453
Affected: 12.5.3-002 Affected: 12.0.3-007 Affected: 12.0.3-005 Affected: 14.1.0-032 Affected: 14.1.0-047 Affected: 14.1.0-041 Affected: 12.0.4-002 Affected: 14.0.2-012 Affected: 11.8.0-414 Affected: 12.0.1-268 Affected: 11.8.1-023 Affected: 11.8.3-021 Affected: 11.8.3-018 Affected: 12.5.1-011 Affected: 11.8.4-004 Affected: 12.5.2-007 Affected: 12.5.2-011 Affected: 14.5.0-498 Affected: 12.5.4-005 Affected: 12.5.4-011 Affected: 12.0.5-011 Affected: 14.0.3-014 Affected: 12.5.5-004 Affected: 12.5.5-005 Affected: 12.5.5-008 Affected: 14.0.4-005 Affected: 14.5.1-008 Affected: 14.5.1-016 Affected: 15.0.0-355 Affected: 15.0.0-322 Affected: 12.5.6-008 Affected: 15.1.0-287 Affected: 14.5.2-011 Affected: 15.2.0-116 Affected: 14.0.5-007 Affected: 15.2.0-164 Affected: 14.5.1-510 Affected: 12.0.2-012 Affected: 12.0.2-004 Affected: 14.5.1-607 Affected: 14.5.3-033 Affected: 14.5.0-673 Affected: 14.5.0-537 Affected: 12.0.1-334 Affected: 14.0.1-503 Affected: 14.0.1-053 Affected: 11.8.0-429 Affected: 14.0.1-040 Affected: 14.0.1-014 Affected: 12.5.1-043 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20183",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T17:00:32.365680Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:00:50.686Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.8.0-453"
},
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.0.3-005"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "12.0.4-002"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "11.8.4-004"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
},
{
"status": "affected",
"version": "12.0.5-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.5-005"
},
{
"status": "affected",
"version": "12.5.5-008"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "12.0.2-012"
},
{
"status": "affected",
"version": "12.0.2-004"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
},
{
"status": "affected",
"version": "14.5.0-673"
},
{
"status": "affected",
"version": "14.5.0-537"
},
{
"status": "affected",
"version": "12.0.1-334"
},
{
"status": "affected",
"version": "14.0.1-503"
},
{
"status": "affected",
"version": "14.0.1-053"
},
{
"status": "affected",
"version": "11.8.0-429"
},
{
"status": "affected",
"version": "14.0.1-040"
},
{
"status": "affected",
"version": "14.0.1-014"
},
{
"status": "affected",
"version": "12.5.1-043"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:21.787Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-swa-range-bypass-2BsEHYSu",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu"
}
],
"source": {
"advisory": "cisco-sa-swa-range-bypass-2BsEHYSu",
"defects": [
"CSCwk58287"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Web Appliance Range Request Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20183",
"datePublished": "2025-02-05T16:14:21.787Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:00:50.686Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20180 (GCVE-0-2025-20180)
Vulnerability from nvd – Published: 2025-02-05 16:14 – Updated: 2025-02-05 17:20
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
Severity ?
4.8 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 13.5.1-277 Affected: 13.0.0-392 Affected: 14.2.0-620 Affected: 13.0.5-007 Affected: 13.5.4-038 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 Affected: 15.5.2-018 Affected: 16.0.0-050 Affected: 15.0.3-002 Affected: 16.0.0-054 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20180",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T17:20:31.169165Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T17:20:45.616Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
},
{
"status": "affected",
"version": "15.5.2-018"
},
{
"status": "affected",
"version": "16.0.0-050"
},
{
"status": "affected",
"version": "15.0.3-002"
},
{
"status": "affected",
"version": "16.0.0-054"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "13.6.2-023"
},
{
"status": "affected",
"version": "13.6.2-078"
},
{
"status": "affected",
"version": "13.0.0-249"
},
{
"status": "affected",
"version": "13.0.0-277"
},
{
"status": "affected",
"version": "13.8.1-052"
},
{
"status": "affected",
"version": "13.8.1-068"
},
{
"status": "affected",
"version": "13.8.1-074"
},
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "12.8.1-002"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "13.6.1-201"
},
{
"status": "affected",
"version": "14.2.0-203"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "12.8.1-021"
},
{
"status": "affected",
"version": "13.8.1-108"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
},
{
"status": "affected",
"version": "15.5.2-005"
},
{
"status": "affected",
"version": "16.0.0-195"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:14:11.746Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-xss-WCk2WcuG",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-xss-WCk2WcuG",
"defects": [
"CSCwn25954"
],
"discovery": "INTERNAL"
},
"title": "Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20180",
"datePublished": "2025-02-05T16:14:11.746Z",
"dateReserved": "2024-10-10T19:15:13.225Z",
"dateUpdated": "2025-02-05T17:20:45.616Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-1425 (GCVE-0-2021-1425)
Vulnerability from nvd – Published: 2024-11-18 15:36 – Updated: 2024-11-18 15:58
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Severity ?
CWE
- CWE-201 - Exposure of Sensitive Information Through Sent Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Email and Web Manager |
Affected:
N/A
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1425",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-18T15:58:03.148324Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:58:19.973Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-201",
"description": "Exposure of Sensitive Information Through Sent Data",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:36:48.271Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"
}
],
"source": {
"advisory": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"defects": [
"CSCvw39308"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Cisco Email Security Appliance and Content Security Management Appliance Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1425",
"datePublished": "2024-11-18T15:36:48.271Z",
"dateReserved": "2020-11-13T00:00:00.000Z",
"dateUpdated": "2024-11-18T15:58:19.973Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20871 (GCVE-0-2022-20871)
Vulnerability from nvd – Published: 2024-11-15 15:27 – Updated: 2024-11-15 15:35
VLAI?
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
Severity ?
6.3 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
12.5.3-002
Affected: 14.1.0-032 Affected: 14.1.0-047 Affected: 14.1.0-041 Affected: 14.0.2-012 Affected: 12.5.1-011 Affected: 12.5.2-007 Affected: 12.5.2-011 Affected: 14.5.0-498 Affected: 12.5.4-005 Affected: 12.5.4-011 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20871",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T15:35:06.319558Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:35:23.825Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.5.3-002"
},
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.2-011"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.4-011"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:27:14.028Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-wsa-prv-esc-8PdRU8t8",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv"
}
],
"source": {
"advisory": "cisco-sa-wsa-prv-esc-8PdRU8t8",
"defects": [
"CSCwb92675"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20871",
"datePublished": "2024-11-15T15:27:14.028Z",
"dateReserved": "2021-11-02T13:28:29.183Z",
"dateUpdated": "2024-11-15T15:35:23.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20504 (GCVE-0-2024-20504)
Vulnerability from nvd – Published: 2024-11-06 16:29 – Updated: 2024-11-06 17:05
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity ?
5.4 (Medium)
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
14.0.0-698
Affected: 14.2.0-620 Affected: 14.2.1-020 Affected: 14.3.0-032 Affected: 15.0.0-104 Affected: 15.0.1-030 Affected: 15.5.0-048 Affected: 15.5.1-055 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20504",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-06T17:05:32.372312Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T17:05:40.097Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-032"
},
{
"status": "affected",
"version": "15.0.0-104"
},
{
"status": "affected",
"version": "15.0.1-030"
},
{
"status": "affected",
"version": "15.5.0-048"
},
{
"status": "affected",
"version": "15.5.1-055"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Email and Web Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.0.0-404"
},
{
"status": "affected",
"version": "14.1.0-223"
},
{
"status": "affected",
"version": "14.1.0-227"
},
{
"status": "affected",
"version": "14.2.0-212"
},
{
"status": "affected",
"version": "14.2.0-224"
},
{
"status": "affected",
"version": "14.2.1-020"
},
{
"status": "affected",
"version": "14.3.0-120"
},
{
"status": "affected",
"version": "15.0.0-334"
},
{
"status": "affected",
"version": "15.5.1-024"
},
{
"status": "affected",
"version": "15.5.1-029"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "14.1.0-032"
},
{
"status": "affected",
"version": "14.1.0-047"
},
{
"status": "affected",
"version": "14.1.0-041"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.5.1-008"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.1.0-287"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.2.0-116"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.2.0-164"
},
{
"status": "affected",
"version": "14.5.1-510"
},
{
"status": "affected",
"version": "14.5.1-607"
},
{
"status": "affected",
"version": "14.5.3-033"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T16:29:37.791Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n"
}
],
"source": {
"advisory": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
"defects": [
"CSCwj72814"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20504",
"datePublished": "2024-11-06T16:29:37.791Z",
"dateReserved": "2023-11-08T15:08:07.687Z",
"dateUpdated": "2024-11-06T17:05:40.097Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20429 (GCVE-0-2024-20429)
Vulnerability from nvd – Published: 2024-07-17 16:29 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
Severity ?
6.5 (Medium)
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
11.0.3-238
Affected: 11.1.0-069 Affected: 11.1.0-131 Affected: 11.1.0-128 Affected: 12.0.0-419 Affected: 12.1.0-071 Affected: 12.1.0-087 Affected: 12.1.0-089 Affected: 13.0.0-392 Affected: 13.0.5-007 Affected: 13.5.1-277 Affected: 13.5.4-038 Affected: 12.5.0-066 Affected: 12.5.4-041 Affected: 12.5.3-041 Affected: 14.0.0-698 Affected: 14.2.0-620 Affected: 14.2.1-020 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "secure_email",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-18T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-19T03:55:39.760Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:41.996Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T16:29:18.884Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"source": {
"advisory": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"defects": [
"CSCwf61949"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20429",
"datePublished": "2024-07-17T16:29:18.884Z",
"dateReserved": "2023-11-08T15:08:07.666Z",
"dateUpdated": "2024-08-01T21:59:41.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20435 (GCVE-0-2024-20435)
Vulnerability from nvd – Published: 2024-07-17 16:27 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
Severity ?
8.8 (High)
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Web Appliance |
Affected:
11.7.0-406
Affected: 11.7.0-418 Affected: 11.7.1-049 Affected: 11.7.1-006 Affected: 11.7.1-020 Affected: 11.7.2-011 Affected: 11.8.0-414 Affected: 11.8.1-023 Affected: 11.8.3-018 Affected: 11.8.3-021 Affected: 12.0.1-268 Affected: 12.0.3-007 Affected: 12.5.2-007 Affected: 12.5.1-011 Affected: 12.5.4-005 Affected: 12.5.5-004 Affected: 12.5.6-008 Affected: 14.5.0-498 Affected: 14.5.1-016 Affected: 14.5.2-011 Affected: 14.0.3-014 Affected: 14.0.2-012 Affected: 14.0.4-005 Affected: 14.0.5-007 Affected: 15.0.0-322 Affected: 15.0.0-355 Affected: 15.1.0-287 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:cisco:secure_web_appliance:11.7.0-406:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.0-418:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-006:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-020:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.1-049:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.7.2-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.0-414:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.1-023:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.3-018:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:11.8.3-021:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.0.1-268:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.0.3-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.1-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.2-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.4-005:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.5-004:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:12.5.6-008:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.2-012:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.3-014:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.4-005:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.0.5-007:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.0-498:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.1-016:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:14.5.2-011:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.0.0-322:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.0.0-355:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_web_appliance:15.1.0-287:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "secure_web_appliance",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "11.7.0-406"
},
{
"status": "affected",
"version": "11.7.0-418"
},
{
"status": "affected",
"version": "11.7.1-006"
},
{
"status": "affected",
"version": "11.7.1-020"
},
{
"status": "affected",
"version": "11.7.1-049"
},
{
"status": "affected",
"version": "11.7.2-011"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.1.0-287"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T17:15:02.287832Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T17:28:04.667Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:42.297Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-swa-priv-esc-7uHpZsCC",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Web Appliance",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.7.0-406"
},
{
"status": "affected",
"version": "11.7.0-418"
},
{
"status": "affected",
"version": "11.7.1-049"
},
{
"status": "affected",
"version": "11.7.1-006"
},
{
"status": "affected",
"version": "11.7.1-020"
},
{
"status": "affected",
"version": "11.7.2-011"
},
{
"status": "affected",
"version": "11.8.0-414"
},
{
"status": "affected",
"version": "11.8.1-023"
},
{
"status": "affected",
"version": "11.8.3-018"
},
{
"status": "affected",
"version": "11.8.3-021"
},
{
"status": "affected",
"version": "12.0.1-268"
},
{
"status": "affected",
"version": "12.0.3-007"
},
{
"status": "affected",
"version": "12.5.2-007"
},
{
"status": "affected",
"version": "12.5.1-011"
},
{
"status": "affected",
"version": "12.5.4-005"
},
{
"status": "affected",
"version": "12.5.5-004"
},
{
"status": "affected",
"version": "12.5.6-008"
},
{
"status": "affected",
"version": "14.5.0-498"
},
{
"status": "affected",
"version": "14.5.1-016"
},
{
"status": "affected",
"version": "14.5.2-011"
},
{
"status": "affected",
"version": "14.0.3-014"
},
{
"status": "affected",
"version": "14.0.2-012"
},
{
"status": "affected",
"version": "14.0.4-005"
},
{
"status": "affected",
"version": "14.0.5-007"
},
{
"status": "affected",
"version": "15.0.0-322"
},
{
"status": "affected",
"version": "15.0.0-355"
},
{
"status": "affected",
"version": "15.1.0-287"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "Execution with Unnecessary Privileges",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T16:27:59.858Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-swa-priv-esc-7uHpZsCC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
}
],
"source": {
"advisory": "cisco-sa-swa-priv-esc-7uHpZsCC",
"defects": [
"CSCwj30015"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20435",
"datePublished": "2024-07-17T16:27:59.858Z",
"dateReserved": "2023-11-08T15:08:07.667Z",
"dateUpdated": "2024-08-01T21:59:42.297Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}