// For flags

CVE-2020-3558

Cisco Firepower Management Center Software Open Redirect Vulnerability

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

Una vulnerabilidad en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado redireccionar a un usuario a una página web maliciosa. La vulnerabilidad es debido a una comprobación de entrada inapropiada de los parámetros de una petición HTTP. Un atacante podría explotar esta vulnerabilidad al interceptar una petición HTTP de un usuario. Una explotación con éxito podría permitir a un atacante modificar la petición HTTP para causar que la interfaz redireccione al usuario hacia una URL maliciosa específica. Este tipo de vulnerabilidad se conoce como ataque de redireccionamiento abierto y se utiliza en ataques de phishing que hacen que los usuarios visiten sitios maliciosos sin saberlo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-10-21 CVE Published
  • 2023-10-25 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.2.0 <= 6.2.3.16
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.2.0 <= 6.2.3.16"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.3.0 <= 6.3.0.5
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.3.0 <= 6.3.0.5"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.4.0 <= 6.4.0.9
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.4.0 <= 6.4.0.9"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.5.0 <= 6.5.0.4
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.5.0 <= 6.5.0.4"
-
Affected