// For flags

CVE-2024-20404

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.
This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.

Una vulnerabilidad en la interfaz de administración basada en web de Cisco Finesse podría permitir que un atacante remoto no autenticado lleve a cabo un ataque SSRF en un sistema afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario para solicitudes HTTP específicas que se envían a un sistema afectado. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podría permitir al atacante obtener información confidencial limitada para los servicios asociados al dispositivo afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-11-08 CVE Reserved
  • 2024-06-05 CVE Published
  • 2024-06-09 First Exploit
  • 2024-06-14 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
< 11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version " < 11.6\(1\)"
-
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
-
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
es4
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
es5
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
es6
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
es7
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
11.6\(1\)
Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)"
es8
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
12.6\(2\)
Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)"
-
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
12.6\(2\)
Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)"
es01
Affected
Cisco
Search vendor "Cisco"
Finesse
Search vendor "Cisco" for product "Finesse"
12.6\(2\)
Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)"
es02
Affected