gsd-2024-20358
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2024-20358", "id": "GSD-2024-20358" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-20358" ], "details": "A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root.", "id": "GSD-2024-20358", "modified": "2023-12-13T01:21:43.136929Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2024-20358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Adaptive Security Appliance (ASA) Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "9.8.1" }, { "version_affected": "=", "version_value": "9.8.1.5" }, { "version_affected": "=", "version_value": "9.8.1.7" }, { "version_affected": "=", "version_value": "9.8.2" }, { "version_affected": "=", "version_value": "9.8.2.8" }, { "version_affected": "=", "version_value": "9.8.2.14" }, { "version_affected": "=", "version_value": "9.8.2.15" }, { "version_affected": "=", "version_value": "9.8.2.17" }, { "version_affected": "=", "version_value": "9.8.2.20" }, { "version_affected": "=", "version_value": "9.8.2.24" }, { "version_affected": "=", "version_value": "9.8.2.26" }, { "version_affected": "=", "version_value": "9.8.2.28" }, { "version_affected": "=", "version_value": "9.8.2.33" }, { "version_affected": "=", "version_value": "9.8.2.35" }, { "version_affected": "=", "version_value": "9.8.2.38" }, { "version_affected": "=", "version_value": "9.8.3.8" }, { "version_affected": "=", "version_value": "9.8.3.11" }, { "version_affected": "=", "version_value": "9.8.3.14" }, { "version_affected": "=", "version_value": "9.8.3.16" }, { "version_affected": "=", "version_value": "9.8.3.18" }, { "version_affected": "=", "version_value": "9.8.3.21" }, { "version_affected": "=", "version_value": "9.8.3" }, { "version_affected": "=", "version_value": "9.8.3.26" }, { "version_affected": "=", "version_value": "9.8.3.29" }, { "version_affected": "=", "version_value": "9.8.4" }, { "version_affected": "=", "version_value": "9.8.4.3" }, { "version_affected": "=", "version_value": "9.8.4.7" }, { "version_affected": "=", "version_value": "9.8.4.8" }, { "version_affected": "=", "version_value": "9.8.4.10" }, { "version_affected": "=", "version_value": "9.8.4.12" }, { "version_affected": "=", "version_value": "9.8.4.15" }, { "version_affected": "=", "version_value": "9.8.4.17" }, { "version_affected": "=", "version_value": "9.8.4.25" }, { "version_affected": "=", "version_value": "9.8.4.20" }, { "version_affected": "=", "version_value": "9.8.4.22" }, { "version_affected": "=", "version_value": "9.8.4.26" }, { "version_affected": "=", "version_value": "9.8.4.29" }, { "version_affected": "=", "version_value": "9.8.4.32" }, { "version_affected": "=", "version_value": "9.8.4.33" }, { "version_affected": "=", "version_value": "9.8.4.34" }, { "version_affected": "=", "version_value": "9.8.4.35" }, { "version_affected": "=", "version_value": "9.8.4.39" }, { "version_affected": "=", "version_value": "9.8.4.40" }, { "version_affected": "=", "version_value": "9.8.4.41" }, { "version_affected": "=", "version_value": "9.8.4.43" }, { "version_affected": "=", "version_value": "9.8.4.44" }, { "version_affected": "=", "version_value": "9.8.4.45" }, { "version_affected": "=", "version_value": "9.8.4.46" }, { "version_affected": "=", "version_value": "9.8.4.48" }, { "version_affected": "=", "version_value": "9.12.1" }, { "version_affected": "=", "version_value": "9.12.1.2" }, { "version_affected": "=", "version_value": "9.12.1.3" }, { "version_affected": "=", "version_value": "9.12.2" }, { "version_affected": "=", "version_value": "9.12.2.4" }, { "version_affected": "=", "version_value": "9.12.2.5" }, { "version_affected": "=", "version_value": "9.12.2.9" }, { "version_affected": "=", "version_value": "9.12.3" }, { "version_affected": "=", "version_value": "9.12.3.2" }, { "version_affected": "=", "version_value": "9.12.3.7" }, { "version_affected": "=", "version_value": "9.12.4" }, { "version_affected": "=", "version_value": "9.12.3.12" }, { "version_affected": "=", "version_value": "9.12.3.9" }, { "version_affected": "=", "version_value": "9.12.2.1" }, { "version_affected": "=", "version_value": "9.12.4.2" }, { "version_affected": "=", "version_value": "9.12.4.4" }, { "version_affected": "=", "version_value": "9.12.4.7" }, { "version_affected": "=", "version_value": "9.12.4.10" }, { "version_affected": "=", "version_value": "9.12.4.13" }, { "version_affected": "=", "version_value": "9.12.4.8" }, { "version_affected": "=", "version_value": "9.12.4.18" }, { "version_affected": "=", "version_value": "9.12.4.24" }, { "version_affected": "=", "version_value": "9.12.4.26" }, { "version_affected": "=", "version_value": "9.12.4.29" }, { "version_affected": "=", "version_value": "9.12.4.30" }, { "version_affected": "=", "version_value": "9.12.4.35" }, { "version_affected": "=", "version_value": "9.12.4.37" }, { "version_affected": "=", "version_value": "9.12.4.38" }, { "version_affected": "=", "version_value": "9.12.4.39" }, { "version_affected": "=", "version_value": "9.12.4.40" }, { "version_affected": "=", "version_value": "9.12.4.41" }, { "version_affected": "=", "version_value": "9.12.4.47" }, { "version_affected": "=", "version_value": "9.12.4.48" }, { "version_affected": "=", "version_value": "9.12.4.50" }, { "version_affected": "=", "version_value": "9.12.4.52" }, { "version_affected": "=", "version_value": "9.12.4.54" }, { "version_affected": "=", "version_value": "9.12.4.55" }, { "version_affected": "=", "version_value": "9.12.4.56" }, { "version_affected": "=", "version_value": "9.12.4.58" }, { "version_affected": "=", "version_value": "9.12.4.62" }, { "version_affected": "=", "version_value": "9.12.4.65" }, { "version_affected": "=", "version_value": "9.14.1" }, { "version_affected": "=", "version_value": "9.14.1.10" }, { "version_affected": "=", "version_value": "9.14.1.6" }, { "version_affected": "=", "version_value": "9.14.1.15" }, { "version_affected": "=", "version_value": "9.14.1.19" }, { "version_affected": "=", "version_value": "9.14.1.30" }, { "version_affected": "=", "version_value": "9.14.2" }, { "version_affected": "=", "version_value": "9.14.2.4" }, { "version_affected": "=", "version_value": "9.14.2.8" }, { "version_affected": "=", "version_value": "9.14.2.13" }, { "version_affected": "=", "version_value": "9.14.2.15" }, { "version_affected": "=", "version_value": "9.14.3" }, { "version_affected": "=", "version_value": "9.14.3.1" }, { "version_affected": "=", "version_value": "9.14.3.9" }, { "version_affected": "=", "version_value": "9.14.3.11" }, { "version_affected": "=", "version_value": "9.14.3.13" }, { "version_affected": "=", "version_value": "9.14.3.18" }, { "version_affected": "=", "version_value": "9.14.3.15" }, { "version_affected": "=", "version_value": "9.14.4" }, { "version_affected": "=", "version_value": "9.14.4.6" }, { "version_affected": "=", "version_value": "9.14.4.7" }, { "version_affected": "=", "version_value": "9.14.4.12" }, { "version_affected": "=", "version_value": "9.14.4.13" }, { "version_affected": "=", "version_value": "9.14.4.14" }, { "version_affected": "=", "version_value": "9.14.4.15" }, { "version_affected": "=", "version_value": "9.14.4.17" }, { "version_affected": "=", "version_value": "9.14.4.22" }, { "version_affected": "=", "version_value": "9.14.4.23" }, { "version_affected": "=", "version_value": "9.15.1" }, { "version_affected": "=", "version_value": "9.15.1.7" }, { "version_affected": "=", "version_value": "9.15.1.10" }, { "version_affected": "=", "version_value": "9.15.1.15" }, { "version_affected": "=", "version_value": "9.15.1.16" }, { "version_affected": "=", "version_value": "9.15.1.17" }, { "version_affected": "=", "version_value": "9.15.1.1" }, { "version_affected": "=", "version_value": "9.15.1.21" }, { "version_affected": "=", "version_value": "9.16.1" }, { "version_affected": "=", "version_value": "9.16.1.28" }, { "version_affected": "=", "version_value": "9.16.2" }, { "version_affected": "=", "version_value": "9.16.2.3" }, { "version_affected": "=", "version_value": "9.16.2.7" }, { "version_affected": "=", "version_value": "9.16.2.11" }, { "version_affected": "=", "version_value": "9.16.2.13" }, { "version_affected": "=", "version_value": "9.16.2.14" }, { "version_affected": "=", "version_value": "9.16.3" }, { "version_affected": "=", "version_value": "9.16.3.3" }, { "version_affected": "=", "version_value": "9.16.3.14" }, { "version_affected": "=", "version_value": "9.16.3.15" }, { "version_affected": "=", "version_value": "9.16.3.19" }, { "version_affected": "=", "version_value": "9.16.3.23" }, { "version_affected": "=", "version_value": "9.16.4" }, { "version_affected": "=", "version_value": "9.16.4.9" }, { "version_affected": "=", "version_value": "9.16.4.14" }, { "version_affected": "=", "version_value": "9.16.4.18" }, { "version_affected": "=", "version_value": "9.16.4.19" }, { "version_affected": "=", "version_value": "9.16.4.27" }, { "version_affected": "=", "version_value": "9.16.4.38" }, { "version_affected": "=", "version_value": "9.16.4.39" }, { "version_affected": "=", "version_value": "9.16.4.42" }, { "version_affected": "=", "version_value": "9.16.4.48" }, { "version_affected": "=", "version_value": "9.16.4.55" }, { "version_affected": "=", "version_value": "9.17.1" }, { "version_affected": "=", "version_value": "9.17.1.7" }, { "version_affected": "=", "version_value": "9.17.1.9" }, { "version_affected": "=", "version_value": "9.17.1.10" }, { "version_affected": "=", "version_value": "9.17.1.11" }, { "version_affected": "=", "version_value": "9.17.1.13" }, { "version_affected": "=", "version_value": "9.17.1.15" }, { "version_affected": "=", "version_value": "9.17.1.20" }, { "version_affected": "=", "version_value": "9.17.1.30" }, { "version_affected": "=", "version_value": "9.17.1.33" }, { "version_affected": "=", "version_value": "9.18.1" }, { "version_affected": "=", "version_value": "9.18.1.3" }, { "version_affected": "=", "version_value": "9.18.2" }, { "version_affected": "=", "version_value": "9.18.2.5" }, { "version_affected": "=", "version_value": "9.18.2.7" }, { "version_affected": "=", "version_value": "9.18.2.8" }, { "version_affected": "=", "version_value": "9.18.3" }, { "version_affected": "=", "version_value": "9.18.3.39" }, { "version_affected": "=", "version_value": "9.18.3.46" }, { "version_affected": "=", "version_value": "9.18.3.53" }, { "version_affected": "=", "version_value": "9.18.3.55" }, { "version_affected": "=", "version_value": "9.18.3.56" }, { "version_affected": "=", "version_value": "9.18.4" }, { "version_affected": "=", "version_value": "9.18.4.5" }, { "version_affected": "=", "version_value": "9.18.4.8" }, { "version_affected": "=", "version_value": "9.19.1" }, { "version_affected": "=", "version_value": "9.19.1.5" }, { "version_affected": "=", "version_value": "9.19.1.9" }, { "version_affected": "=", "version_value": "9.19.1.12" }, { "version_affected": "=", "version_value": "9.19.1.18" }, { "version_affected": "=", "version_value": "9.19.1.22" }, { "version_affected": "=", "version_value": "9.19.1.24" }, { "version_affected": "=", "version_value": "9.19.1.27" }, { "version_affected": "=", "version_value": "9.20.1" }, { "version_affected": "=", "version_value": "9.20.1.5" }, { "version_affected": "=", "version_value": "9.20.2" } ] } }, { "product_name": "Cisco Firepower Threat Defense Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.2.3" }, { "version_affected": "=", "version_value": "6.2.3.1" }, { "version_affected": "=", "version_value": "6.2.3.2" }, { "version_affected": "=", "version_value": "6.2.3.3" }, { "version_affected": "=", "version_value": "6.2.3.4" }, { "version_affected": "=", "version_value": "6.2.3.5" }, { "version_affected": "=", "version_value": "6.2.3.6" }, { "version_affected": "=", "version_value": "6.2.3.7" }, { "version_affected": "=", "version_value": "6.2.3.8" }, { "version_affected": "=", "version_value": "6.2.3.10" }, { "version_affected": "=", "version_value": "6.2.3.11" }, { "version_affected": "=", "version_value": "6.2.3.9" }, { "version_affected": "=", "version_value": "6.2.3.12" }, { "version_affected": "=", "version_value": "6.2.3.13" }, { "version_affected": "=", "version_value": "6.2.3.14" }, { "version_affected": "=", "version_value": "6.2.3.15" }, { "version_affected": "=", "version_value": "6.2.3.16" }, { "version_affected": "=", "version_value": "6.2.3.17" }, { "version_affected": "=", "version_value": "6.2.3.18" }, { "version_affected": "=", "version_value": "6.6.0" }, { "version_affected": "=", "version_value": "6.6.0.1" }, { "version_affected": "=", "version_value": "6.6.1" }, { "version_affected": "=", "version_value": "6.6.3" }, { "version_affected": "=", "version_value": "6.6.4" }, { "version_affected": "=", "version_value": "6.6.5" }, { "version_affected": "=", "version_value": "6.6.5.1" }, { "version_affected": "=", "version_value": "6.6.5.2" }, { "version_affected": "=", "version_value": "6.6.7" }, { "version_affected": "=", "version_value": "6.6.7.1" }, { "version_affected": "=", "version_value": "6.4.0" }, { "version_affected": "=", "version_value": "6.4.0.1" }, { "version_affected": "=", "version_value": "6.4.0.3" }, { "version_affected": "=", "version_value": "6.4.0.2" }, { "version_affected": "=", "version_value": "6.4.0.4" }, { "version_affected": "=", "version_value": "6.4.0.5" }, { "version_affected": "=", "version_value": "6.4.0.6" }, { "version_affected": "=", "version_value": "6.4.0.7" }, { "version_affected": "=", "version_value": "6.4.0.8" }, { "version_affected": "=", "version_value": "6.4.0.9" }, { "version_affected": "=", "version_value": "6.4.0.10" }, { "version_affected": "=", "version_value": "6.4.0.11" }, { "version_affected": "=", "version_value": "6.4.0.12" }, { "version_affected": "=", "version_value": "6.4.0.13" }, { "version_affected": "=", "version_value": "6.4.0.14" }, { "version_affected": "=", "version_value": "6.4.0.15" }, { "version_affected": "=", "version_value": "6.4.0.16" }, { "version_affected": "=", "version_value": "6.4.0.17" }, { "version_affected": "=", "version_value": "6.7.0" }, { "version_affected": "=", "version_value": "6.7.0.1" }, { "version_affected": "=", "version_value": "6.7.0.2" }, { "version_affected": "=", "version_value": "6.7.0.3" }, { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" }, { "version_affected": "=", "version_value": "7.0.2" }, { "version_affected": "=", "version_value": "7.0.2.1" }, { "version_affected": "=", "version_value": "7.0.3" }, { "version_affected": "=", "version_value": "7.0.4" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.0.6" }, { "version_affected": "=", "version_value": "7.0.6.1" }, { "version_affected": "=", "version_value": "7.1.0" }, { "version_affected": "=", "version_value": "7.1.0.1" }, { "version_affected": "=", "version_value": "7.1.0.2" }, { "version_affected": "=", "version_value": "7.1.0.3" }, { "version_affected": "=", "version_value": "7.2.0" }, { "version_affected": "=", "version_value": "7.2.0.1" }, { "version_affected": "=", "version_value": "7.2.1" }, { "version_affected": "=", "version_value": "7.2.2" }, { "version_affected": "=", "version_value": "7.2.3" }, { "version_affected": "=", "version_value": "7.2.4" }, { "version_affected": "=", "version_value": "7.2.4.1" }, { "version_affected": "=", "version_value": "7.2.5" }, { "version_affected": "=", "version_value": "7.2.5.1" }, { "version_affected": "=", "version_value": "7.3.0" }, { "version_affected": "=", "version_value": "7.3.1" }, { "version_affected": "=", "version_value": "7.3.1.1" }, { "version_affected": "=", "version_value": "7.4.0" }, { "version_affected": "=", "version_value": "7.4.1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-78", "lang": "eng", "value": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm" } ] }, "source": { "advisory": "cisco-sa-asaftd-cmd-inj-ZJV8Wysm", "defects": [ "CSCwi90040" ], "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de restauraci\u00f3n de Cisco Adaptive Security Appliance (ASA) que est\u00e1 disponible en el software Cisco ASA y el software Cisco Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios en el sistema operativo subyacente con privilegios de nivel ra\u00edz. Se requieren privilegios de nivel de administrador para aprovechar esta vulnerabilidad. Esta vulnerabilidad existe porque el contenido de un archivo de respaldo no se sanitiza incorrectamente en el momento de la restauraci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad restaurando un archivo de copia de seguridad manipulado en un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo Linux subyacente como root." } ], "id": "CVE-2024-20358", "lastModified": "2024-04-25T13:18:20.370", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2024-04-24T20:15:07.670", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.