// For flags

CVE-2020-3187

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

7
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.

Una vulnerabilidad en la interfaz de servicios web del Cisco Adaptive Security Appliance (ASA) Software y el Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto no autenticado conducir ataques de tipo salto de directorio y obtener acceso de lectura y eliminación a archivos confidenciales en un sistema apuntado. La vulnerabilidad es debido a una falta de comprobación apropiada de la entrada de la URL HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada que contenga secuencias de caracteres de salto de directorio. Una explotación podría permitir a un atacante visualizar o eliminar archivos arbitrarios en el sistema apuntado. Cuando el dispositivo es reiniciado después de la explotación de esta vulnerabilidad, todos los archivos que fueron eliminados son restaurados. El atacante solo puede visualizar y eliminar archivos dentro del sistema de archivos de los servicios web. Este sistema de archivos es habilitado cuando el dispositivo afectado es configurado con las funciones WebVPN o AnyConnect. Esta vulnerabilidad no puede ser utilizada para obtener acceso a los archivos del sistema ASA o FTD o los archivos subyacentes del sistema operativo (SO). El reinicio del dispositivo afectado restaurará todos los archivos dentro del sistema de archivos de los servicios web.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-05-06 CVE Published
  • 2020-07-28 First Exploit
  • 2024-09-16 CVE Updated
  • 2024-10-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asa 5505 Firmware
Search vendor "Cisco" for product "Asa 5505 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5505 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5505
Search vendor "Cisco" for product "Asa 5505"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5510 Firmware
Search vendor "Cisco" for product "Asa 5510 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5510 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5510
Search vendor "Cisco" for product "Asa 5510"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5512-x Firmware
Search vendor "Cisco" for product "Asa 5512-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5512-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5512-x
Search vendor "Cisco" for product "Asa 5512-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5515-x Firmware
Search vendor "Cisco" for product "Asa 5515-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5515-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5515-x
Search vendor "Cisco" for product "Asa 5515-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5520 Firmware
Search vendor "Cisco" for product "Asa 5520 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5520 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5520
Search vendor "Cisco" for product "Asa 5520"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5525-x Firmware
Search vendor "Cisco" for product "Asa 5525-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5525-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5525-x
Search vendor "Cisco" for product "Asa 5525-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5540 Firmware
Search vendor "Cisco" for product "Asa 5540 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5540 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5540
Search vendor "Cisco" for product "Asa 5540"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5545-x Firmware
Search vendor "Cisco" for product "Asa 5545-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5545-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5545-x
Search vendor "Cisco" for product "Asa 5545-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5550 Firmware
Search vendor "Cisco" for product "Asa 5550 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5550 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5550
Search vendor "Cisco" for product "Asa 5550"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5555-x Firmware
Search vendor "Cisco" for product "Asa 5555-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5555-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5555-x
Search vendor "Cisco" for product "Asa 5555-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5580 Firmware
Search vendor "Cisco" for product "Asa 5580 Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5580 Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5580
Search vendor "Cisco" for product "Asa 5580"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5585-x Firmware
Search vendor "Cisco" for product "Asa 5585-x Firmware"
9.6\(4\)
Search vendor "Cisco" for product "Asa 5585-x Firmware" and version "9.6\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5585-x
Search vendor "Cisco" for product "Asa 5585-x"
--
Safe
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.2.3 < 6.2.3.16
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.2.3 < 6.2.3.16"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.3.0 < 6.3.0.6
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.3.0 < 6.3.0.6"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.4.0 < 6.4.0.8
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.4.0 < 6.4.0.8"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.5.0 < 6.5.0.4
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.5.0 < 6.5.0.4"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.6 < 9.6.4.40
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.6 < 9.6.4.40"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.8 < 9.8.4.15
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.8 < 9.8.4.15"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.9 < 9.9.2.66
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.9 < 9.9.2.66"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.10 < 9.10.1.37
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.10 < 9.10.1.37"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.12 < 9.12.3.2
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.12 < 9.12.3.2"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.13 < 9.13.1.7
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.13 < 9.13.1.7"
-
Affected