FKIE_CVE-2024-20429

Vulnerability from fkie_nvd - Published: 2024-07-17 17:15 - Updated: 2025-08-08 01:56
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device. This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*",
              "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*",
              "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de operador v\u00e1lidas."
    }
  ],
  "id": "CVE-2024-20429",
  "lastModified": "2025-08-08T01:56:39.500",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-17T17:15:14.497",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…