// For flags

CVE-2020-3178

Cisco Content Security Management Appliance Open Redirect Vulnerabilities

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites.

Múltiples vulnerabilidades en la Interfaz de Usuario Gráfica basada en web del Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA), podrían permitir a un atacante remoto no autenticado redireccionar a un usuario hacia una página web maliciosa. Las vulnerabilidades son debido a una comprobación de entrada inapropiada de los parámetros de una petición HTTP. Un atacante podría explotar estas vulnerabilidades interceptando una petición HTTP y modificándola para redireccionar a un usuario hacia una URL maliciosa específica. Una explotación con éxito podría permitir a un atacante redireccionar a un usuario hacia una página web maliciosa u obtener información confidencial basada en navegador. Este tipo de ataque se conoce comúnmente como un ataque de redireccionamiento abierto y se utiliza en ataques de phishing para que los usuarios visiten sitios maliciosos sin saberlo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-05-06 CVE Published
  • 2023-05-10 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Content Security Management Appliance
Search vendor "Cisco" for product "Content Security Management Appliance"
< 13.6.0
Search vendor "Cisco" for product "Content Security Management Appliance" and version " < 13.6.0"
-
Affected