CVE-2024-20429 (GCVE-0-2024-20429)
Vulnerability from cvelistv5 – Published: 2024-07-17 16:29 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
Severity ?
6.5 (Medium)
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Email |
Affected:
11.0.3-238
Affected: 11.1.0-069 Affected: 11.1.0-131 Affected: 11.1.0-128 Affected: 12.0.0-419 Affected: 12.1.0-071 Affected: 12.1.0-087 Affected: 12.1.0-089 Affected: 13.0.0-392 Affected: 13.0.5-007 Affected: 13.5.1-277 Affected: 13.5.4-038 Affected: 12.5.0-066 Affected: 12.5.4-041 Affected: 12.5.3-041 Affected: 14.0.0-698 Affected: 14.2.0-620 Affected: 14.2.1-020 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "secure_email",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-18T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-19T03:55:39.760Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:41.996Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Email",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "11.0.3-238"
},
{
"status": "affected",
"version": "11.1.0-069"
},
{
"status": "affected",
"version": "11.1.0-131"
},
{
"status": "affected",
"version": "11.1.0-128"
},
{
"status": "affected",
"version": "12.0.0-419"
},
{
"status": "affected",
"version": "12.1.0-071"
},
{
"status": "affected",
"version": "12.1.0-087"
},
{
"status": "affected",
"version": "12.1.0-089"
},
{
"status": "affected",
"version": "13.0.0-392"
},
{
"status": "affected",
"version": "13.0.5-007"
},
{
"status": "affected",
"version": "13.5.1-277"
},
{
"status": "affected",
"version": "13.5.4-038"
},
{
"status": "affected",
"version": "12.5.0-066"
},
{
"status": "affected",
"version": "12.5.4-041"
},
{
"status": "affected",
"version": "12.5.3-041"
},
{
"status": "affected",
"version": "14.0.0-698"
},
{
"status": "affected",
"version": "14.2.0-620"
},
{
"status": "affected",
"version": "14.2.1-020"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T16:29:18.884Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
}
],
"source": {
"advisory": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"defects": [
"CSCwf61949"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20429",
"datePublished": "2024-07-17T16:29:18.884Z",
"dateReserved": "2023-11-08T15:08:07.666Z",
"dateUpdated": "2024-08-01T21:59:41.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\\r\\n\\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la interfaz de administraci\\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\\u00f3n basada en web. Un atacante podr\\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \\u00e9xito esta vulnerabilidad, un atacante necesitar\\u00eda al menos credenciales de operador v\\u00e1lidas.\"}]",
"id": "CVE-2024-20429",
"lastModified": "2024-11-21T08:52:36.500",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.2}]}",
"published": "2024-07-17T17:15:14.497",
"references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-74\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-20429\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-07-17T17:15:14.497\",\"lastModified\":\"2025-08-08T01:56:39.500\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\\r\\n\\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de operador v\u00e1lidas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9440FAD-6BE1-4550-8149-2CFF126EBFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779EC449-8CA2-4DAD-B59A-022C074236BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F54F1B9-9765-445D-AE5E-C42281B3D50E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5FBEA5-29B5-4F8D-8A0D-DE329094816B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16601C4-8B80-427A-8CCA-A0470F61848E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53FC4B6-BBD2-410A-AF02-2C2C22B09B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F976B1FD-16F1-4F3E-8C0D-B0EFB0628436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF52987D-3E2D-48A6-AA42-FA824572A25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A52A2-DA64-4076-ACFE-2F2D42877D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FED2AC8-7F6C-4653-BF1F-878A59174C55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE94BE-6A3A-4873-BFCF-93E550F099A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A787134E-F72F-4543-8F0E-3125A982BE3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E06464-FA10-4AA0-8320-FED11EF0B5ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B6F533-7521-4DC1-8481-034E6CDE22DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A48B45C-E1B4-4524-A095-631C408044A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189C0A83-6BF1-45AD-ACC1-FB7561B901A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6FBC8A-8187-4903-B786-6CF341C142B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68864429-9730-43E9-96C3-20B9035BB291\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1322B8-1CF9-4B17-9A58-38788051ED4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139A640B-1957-4953-AA88-9D373A5152D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08EA2AD-618B-4834-A52D-73F6A4502DF1\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"name\": \"cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:41.996Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20429\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-17T17:31:52.568286Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"secure_email\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.3-238\"}, {\"status\": \"affected\", \"version\": \"11.1.0-069\"}, {\"status\": \"affected\", \"version\": \"11.1.0-131\"}, {\"status\": \"affected\", \"version\": \"11.1.0-128\"}, {\"status\": \"affected\", \"version\": \"12.0.0-419\"}, {\"status\": \"affected\", \"version\": \"12.1.0-071\"}, {\"status\": \"affected\", \"version\": \"12.1.0-087\"}, {\"status\": \"affected\", \"version\": \"12.1.0-089\"}, {\"status\": \"affected\", \"version\": \"13.0.0-392\"}, {\"status\": \"affected\", \"version\": \"13.0.5-007\"}, {\"status\": \"affected\", \"version\": \"13.5.1-277\"}, {\"status\": \"affected\", \"version\": \"13.5.4-038\"}, {\"status\": \"affected\", \"version\": \"12.5.0-066\"}, {\"status\": \"affected\", \"version\": \"12.5.4-041\"}, {\"status\": \"affected\", \"version\": \"12.5.3-041\"}, {\"status\": \"affected\", \"version\": \"14.0.0-698\"}, {\"status\": \"affected\", \"version\": \"14.2.0-620\"}, {\"status\": \"affected\", \"version\": \"14.2.1-020\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-17T17:52:07.827Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCwf61949\"], \"advisory\": \"cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Secure Email\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.3-238\"}, {\"status\": \"affected\", \"version\": \"11.1.0-069\"}, {\"status\": \"affected\", \"version\": \"11.1.0-131\"}, {\"status\": \"affected\", \"version\": \"11.1.0-128\"}, {\"status\": \"affected\", \"version\": \"12.0.0-419\"}, {\"status\": \"affected\", \"version\": \"12.1.0-071\"}, {\"status\": \"affected\", \"version\": \"12.1.0-087\"}, {\"status\": \"affected\", \"version\": \"12.1.0-089\"}, {\"status\": \"affected\", \"version\": \"13.0.0-392\"}, {\"status\": \"affected\", \"version\": \"13.0.5-007\"}, {\"status\": \"affected\", \"version\": \"13.5.1-277\"}, {\"status\": \"affected\", \"version\": \"13.5.4-038\"}, {\"status\": \"affected\", \"version\": \"12.5.0-066\"}, {\"status\": \"affected\", \"version\": \"12.5.4-041\"}, {\"status\": \"affected\", \"version\": \"12.5.3-041\"}, {\"status\": \"affected\", \"version\": \"14.0.0-698\"}, {\"status\": \"affected\", \"version\": \"14.2.0-620\"}, {\"status\": \"affected\", \"version\": \"14.2.1-020\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\", \"name\": \"cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\\r\\n\\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-74\", \"description\": \"Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-07-17T16:29:18.884Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-20429\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:59:41.996Z\", \"dateReserved\": \"2023-11-08T15:08:07.666Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-07-17T16:29:18.884Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…