CVE-2020-3187
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
Una vulnerabilidad en la interfaz de servicios web del Cisco Adaptive Security Appliance (ASA) Software y el Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto no autenticado conducir ataques de tipo salto de directorio y obtener acceso de lectura y eliminación a archivos confidenciales en un sistema apuntado. La vulnerabilidad es debido a una falta de comprobación apropiada de la entrada de la URL HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada que contenga secuencias de caracteres de salto de directorio. Una explotación podría permitir a un atacante visualizar o eliminar archivos arbitrarios en el sistema apuntado. Cuando el dispositivo es reiniciado después de la explotación de esta vulnerabilidad, todos los archivos que fueron eliminados son restaurados. El atacante solo puede visualizar y eliminar archivos dentro del sistema de archivos de los servicios web. Este sistema de archivos es habilitado cuando el dispositivo afectado es configurado con las funciones WebVPN o AnyConnect. Esta vulnerabilidad no puede ser utilizada para obtener acceso a los archivos del sistema ASA o FTD o los archivos subyacentes del sistema operativo (SO). El reinicio del dispositivo afectado restaurará todos los archivos dentro del sistema de archivos de los servicios web.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-12 CVE Reserved
- 2020-05-06 CVE Published
- 2020-07-28 First Exploit
- 2024-09-16 CVE Updated
- 2024-10-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (8)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Asa 5505 Firmware Search vendor "Cisco" for product "Asa 5505 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5505 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5505 Search vendor "Cisco" for product "Asa 5505" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5510 Firmware Search vendor "Cisco" for product "Asa 5510 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5510 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5510 Search vendor "Cisco" for product "Asa 5510" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5512-x Firmware Search vendor "Cisco" for product "Asa 5512-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5512-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5512-x Search vendor "Cisco" for product "Asa 5512-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5515-x Firmware Search vendor "Cisco" for product "Asa 5515-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5515-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5515-x Search vendor "Cisco" for product "Asa 5515-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5520 Firmware Search vendor "Cisco" for product "Asa 5520 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5520 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5520 Search vendor "Cisco" for product "Asa 5520" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5525-x Firmware Search vendor "Cisco" for product "Asa 5525-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5525-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5525-x Search vendor "Cisco" for product "Asa 5525-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5540 Firmware Search vendor "Cisco" for product "Asa 5540 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5540 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5540 Search vendor "Cisco" for product "Asa 5540" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5545-x Firmware Search vendor "Cisco" for product "Asa 5545-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5545-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5545-x Search vendor "Cisco" for product "Asa 5545-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5550 Firmware Search vendor "Cisco" for product "Asa 5550 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5550 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5550 Search vendor "Cisco" for product "Asa 5550" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5555-x Firmware Search vendor "Cisco" for product "Asa 5555-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5555-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5555-x Search vendor "Cisco" for product "Asa 5555-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5580 Firmware Search vendor "Cisco" for product "Asa 5580 Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5580 Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5580 Search vendor "Cisco" for product "Asa 5580" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5585-x Firmware Search vendor "Cisco" for product "Asa 5585-x Firmware" | 9.6\(4\) Search vendor "Cisco" for product "Asa 5585-x Firmware" and version "9.6\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5585-x Search vendor "Cisco" for product "Asa 5585-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Firepower Threat Defense Search vendor "Cisco" for product "Firepower Threat Defense" | >= 6.2.3 < 6.2.3.16 Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.2.3 < 6.2.3.16" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Firepower Threat Defense Search vendor "Cisco" for product "Firepower Threat Defense" | >= 6.3.0 < 6.3.0.6 Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.3.0 < 6.3.0.6" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Firepower Threat Defense Search vendor "Cisco" for product "Firepower Threat Defense" | >= 6.4.0 < 6.4.0.8 Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.4.0 < 6.4.0.8" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Firepower Threat Defense Search vendor "Cisco" for product "Firepower Threat Defense" | >= 6.5.0 < 6.5.0.4 Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.5.0 < 6.5.0.4" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.6 < 9.6.4.40 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.6 < 9.6.4.40" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.8 < 9.8.4.15 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.8 < 9.8.4.15" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.9 < 9.9.2.66 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.9 < 9.9.2.66" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.10 < 9.10.1.37 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.10 < 9.10.1.37" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.12 < 9.12.3.2 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.12 < 9.12.3.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | >= 9.13 < 9.13.1.7 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.13 < 9.13.1.7" | - |
Affected
|