CVE-2024-20404
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.
This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
Una vulnerabilidad en la interfaz de administración basada en web de Cisco Finesse podría permitir que un atacante remoto no autenticado lleve a cabo un ataque SSRF en un sistema afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario para solicitudes HTTP específicas que se envían a un sistema afectado. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podría permitir al atacante obtener información confidencial limitada para los servicios asociados al dispositivo afectado.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-11-08 CVE Reserved
- 2024-06-05 CVE Published
- 2024-06-09 First Exploit
- 2024-06-14 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/AbdElRahmanEzzat1995/CVE-2024-20404 | 2024-06-09 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | < 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version " < 11.6\(1\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | es4 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | es5 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | es6 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | es7 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 11.6\(1\) Search vendor "Cisco" for product "Finesse" and version "11.6\(1\)" | es8 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 12.6\(2\) Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 12.6\(2\) Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)" | es01 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Finesse Search vendor "Cisco" for product "Finesse" | 12.6\(2\) Search vendor "Cisco" for product "Finesse" and version "12.6\(2\)" | es02 |
Affected
|