TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-3452

HIGHCISA KEV
7.5

Beschreibung

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.

CVE Details

CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/22/2020
Zuletzt geandert10/28/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerCisco
ProduktAdaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)
SchwachstellennameCisco ASA and FTD Read-Only Path Traversal Vulnerability
KEV Aufnahmedatum2021-11-03
Behebungsfrist2022-05-03
Ransomware-NutzungUnknown

Betroffene Produkte

cisco:adaptive_security_appliance_softwarecisco:asa_5505cisco:asa_5510cisco:asa_5512-xcisco:asa_5515-xcisco:asa_5520cisco:asa_5525-xcisco:asa_5540cisco:asa_5545-xcisco:asa_5550cisco:asa_5555-xcisco:asa_5580cisco:asa_5585-xcisco:firepower_threat_defense

Schwachen (CWE)

CWE-20CWE-22

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.