Vulnerabilites related to cisco - secure_email_gateway_virtual_appliance_c100v
CVE-2025-20180 (GCVE-0-2025-20180)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 13.5.1-277 Version: 13.0.0-392 Version: 14.2.0-620 Version: 13.0.5-007 Version: 13.5.4-038 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 Version: 15.5.2-018 Version: 16.0.0-050 Version: 15.0.3-002 Version: 16.0.0-054 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T17:20:31.169165Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T17:20:45.616Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" }, { "status": "affected", "version": "15.5.2-018" }, { "status": "affected", "version": "16.0.0-050" }, { "status": "affected", "version": "15.0.3-002" }, { "status": "affected", "version": "16.0.0-054" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.6.2-023" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.0.0-249" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.8.1-052" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "13.6.1-201" }, { "status": "affected", "version": "14.2.0-203" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" }, { "status": "affected", "version": "15.5.1-024" }, { "status": "affected", "version": "15.5.1-029" }, { "status": "affected", "version": "15.5.2-005" }, { "status": "affected", "version": "16.0.0-195" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:11.746Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-xss-WCk2WcuG", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG" } ], "source": { "advisory": "cisco-sa-esa-sma-xss-WCk2WcuG", "defects": [ "CSCwn25954" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20180", "datePublished": "2025-02-05T16:14:11.746Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-02-05T17:20:45.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20257 (GCVE-0-2024-20257)
Vulnerability from cvelistv5
Published
2024-05-15 17:58
Modified
2024-08-01 21:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20257", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T16:02:05.959708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:16.569Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:58:59.579Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwf73258" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20257", "datePublished": "2024-05-15T17:58:59.579Z", "dateReserved": "2023-11-08T15:08:07.623Z", "dateUpdated": "2024-08-01T21:52:31.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20258 (GCVE-0-2024-20258)
Vulnerability from cvelistv5
Published
2024-05-15 17:32
Modified
2024-08-01 21:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:secure_email:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "15.5.0-048", "status": "affected", "version": "11.0.3-238", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email_and_web_manager", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "15.0.0-334", "status": "affected", "version": "9.0.0-087", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20258", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T17:18:20.336833Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:25.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.0.0-087" }, { "status": "affected", "version": "11.0.0-115" }, { "status": "affected", "version": "11.0.1-161" }, { "status": "affected", "version": "11.5.1-105" }, { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:32:16.125Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwf84882", "CSCwj12619", "CSCwf93368" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20258", "datePublished": "2024-05-15T17:32:16.125Z", "dateReserved": "2023-11-08T15:08:07.623Z", "dateUpdated": "2024-08-01T21:52:31.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20429 (GCVE-0-2024-20429)
Vulnerability from cvelistv5
Published
2024-07-17 16:29
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email", "vendor": "cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20429", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T03:55:39.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-17T16:29:18.884Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "source": { "advisory": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "defects": [ "CSCwf61949" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20429", "datePublished": "2024-07-17T16:29:18.884Z", "dateReserved": "2023-11-08T15:08:07.666Z", "dateUpdated": "2024-08-01T21:59:41.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20184 (GCVE-0-2025-20184)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 13.5.1-277 Version: 13.0.0-392 Version: 14.2.0-620 Version: 13.0.5-007 Version: 13.5.4-038 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 Version: 15.5.2-018 Version: 15.0.3-002 Version: 15.5.3-022 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20184", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:59:57.945223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T17:00:15.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" }, { "status": "affected", "version": "15.5.2-018" }, { "status": "affected", "version": "15.0.3-002" }, { "status": "affected", "version": "15.5.3-022" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-453" }, { "status": "affected", "version": "12.5.3-002" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.0.3-005" }, { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "12.0.4-002" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "11.8.4-004" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.2-011" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.4-011" }, { "status": "affected", "version": "12.0.5-011" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.5-005" }, { "status": "affected", "version": "12.5.5-008" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "12.0.2-012" }, { "status": "affected", "version": "12.0.2-004" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" }, { "status": "affected", "version": "15.0.1-004" }, { "status": "affected", "version": "15.2.1-011" }, { "status": "affected", "version": "14.5.0-673" }, { "status": "affected", "version": "14.5.0-537" }, { "status": "affected", "version": "12.0.1-334" }, { "status": "affected", "version": "14.0.1-503" }, { "status": "affected", "version": "14.0.1-053" }, { "status": "affected", "version": "11.8.0-429" }, { "status": "affected", "version": "14.0.1-040" }, { "status": "affected", "version": "14.0.1-014" }, { "status": "affected", "version": "12.5.1-043" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:30.863Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "defects": [ "CSCwk70559" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager and Secure Web Appliance Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20184", "datePublished": "2025-02-05T16:14:30.863Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-02-05T17:00:15.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20504 (GCVE-0-2024-20504)
Vulnerability from cvelistv5
Published
2024-11-06 16:29
Modified
2024-11-06 17:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20504", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T17:05:32.372312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T17:05:40.097Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" }, { "status": "affected", "version": "15.5.1-024" }, { "status": "affected", "version": "15.5.1-029" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:29:37.791Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-wsa-sma-xss-zYm3f49n", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n" } ], "source": { "advisory": "cisco-sa-esa-wsa-sma-xss-zYm3f49n", "defects": [ "CSCwj72814" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20504", "datePublished": "2024-11-06T16:29:37.791Z", "dateReserved": "2023-11-08T15:08:07.687Z", "dateUpdated": "2024-11-06T17:05:40.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20392 (GCVE-0-2024-20392)
Vulnerability from cvelistv5
Published
2024-05-15 17:22
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-113 - Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Summary
A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack.
This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20392", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-15T19:20:56.899213Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:31.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-http-split-GLrnnOwS", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. \r\n\r This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-113", "description": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Response Splitting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:22:39.980Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-http-split-GLrnnOwS", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "source": { "advisory": "cisco-sa-esa-http-split-GLrnnOwS", "defects": [ "CSCwh12975" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20392", "datePublished": "2024-05-15T17:22:39.980Z", "dateReserved": "2023-11-08T15:08:07.659Z", "dateUpdated": "2024-08-01T21:59:42.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-15 20:36
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*", "matchCriteriaId": "80439833-447F-4582-B1FA-278306ABFE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*", "matchCriteriaId": "29CB6A5B-34EE-4958-ACB5-6433E8C0014D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-249:*:*:*:*:*:*:*", "matchCriteriaId": "9332990D-7532-4CE6-A02B-81B9445C09F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*", "matchCriteriaId": "C18D9472-A7E4-4083-9369-DBA97A40022B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.1-201:*:*:*:*:*:*:*", "matchCriteriaId": "FF1F8E93-E5CF-4C73-BFFA-2B3DB2C764BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-023:*:*:*:*:*:*:*", "matchCriteriaId": "86750D2A-0D2D-4775-B7B6-261337F3F72D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*", "matchCriteriaId": "8A1365DA-3163-4CFF-9F48-1998C9F6A29B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-052:*:*:*:*:*:*:*", "matchCriteriaId": "4D26ED91-0192-4606-B304-2BD926A4E854", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*", "matchCriteriaId": "2C5B0C94-A72F-4B5A-A9F8-00EF60D6C001", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*", "matchCriteriaId": "74C14467-2836-4FDF-8B4B-670D08511614", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*", "matchCriteriaId": "E50DAB07-5582-47C8-A0B0-7C0DA63DC70A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*", "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-203:*:*:*:*:*:*:*", "matchCriteriaId": "2D9CA168-015D-4962-BB8D-E5BB10925D1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*", "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*", "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*", "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*", "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*", "matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*", "matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-005:*:*:*:*:*:*:*", "matchCriteriaId": "F571B6DA-9940-4B08-8A7F-7A4B0B36ACB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-195:*:*:*:*:*:*:*", "matchCriteriaId": "5B49B71D-89F0-40B0-B93F-2C038583C367", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*", "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-050:*:*:*:*:*:*:*", "matchCriteriaId": "4C829294-B71F-4201-8BF0-623D45E93C7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-054:*:*:*:*:*:*:*", "matchCriteriaId": "7176E776-01D3-432F-BD8C-38B15AAF62F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager y Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales v\u00e1lidas para una cuenta de usuario con al menos el rol de Operador." } ], "id": "CVE-2025-20180", "lastModified": "2025-08-15T20:36:40.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.370", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-06 16:48
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack.
This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | asyncos | 14.3.0-032 | |
cisco | asyncos | 15.0.0-104 | |
cisco | asyncos | 15.0.1-030 | |
cisco | asyncos | 15.5.0-048 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. \r\n\r This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la API de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de divisi\u00f3n de respuesta HTTP. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de algunos par\u00e1metros que se pasan a la API de administraci\u00f3n basada en web del sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante realizar ataques de cross-site scripting (XSS), lo que dar\u00eda como resultado la ejecuci\u00f3n de c\u00f3digo de script arbitrario en el navegador del usuario objetivo, o podr\u00eda permitir que el atacante acceda a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20392", "lastModified": "2025-08-06T16:48:40.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T18:15:10.390", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-113" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-07-31 19:44
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "98BB5CCD-FDE7-4893-B504-71742B9B69A7", "versionEndExcluding": "15.0.2-034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A27C67F0-EB2E-4473-808F-D93867B3C7B6", "versionEndExcluding": "15.5.1-055", "versionStartIncluding": "15.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "547E3547-7946-4CDA-B83C-397BA2A64851", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AEC20C6-EBD6-4DC1-AFED-42C165ED3F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B927280-353B-49B2-A87E-45D6602C423D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B017D7F9-2297-4235-8DB8-0A29E1202254", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDD9108-5581-49E9-8182-528CF111F682", "versionEndExcluding": "15.5.1-024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email and Web Manager y Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20258", "lastModified": "2025-07-31T19:44:11.867", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-05-15T18:15:09.193", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-06 16:56
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 11.1.0-131 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | asyncos | 14.3.0-032 | |
cisco | asyncos | 15.0.0-104 | |
cisco | asyncos | 15.0.1-030 | |
cisco | asyncos | 15.5.0-048 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20257", "lastModified": "2025-08-06T16:56:50.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-05-15T18:15:08.967", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-17 17:15
Modified
2025-08-08 01:56
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 11.1.0-131 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de operador v\u00e1lidas." } ], "id": "CVE-2024-20429", "lastModified": "2025-08-08T01:56:39.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-17T17:15:14.497", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-08 17:11
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*", "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.3-022:*:*:*:*:*:*:*", "matchCriteriaId": "D72D8A34-34BF-4390-B244-23AEAC08ACD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*", "matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*", "matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*", "matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*", "matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*", "matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*", "matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*", "matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*", "matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*", "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*", "matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*", "matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*", "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*", "matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*", "matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*", "matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*", "matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*", "matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*", "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*", "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*", "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-004:*:*:*:*:*:*:*", "matchCriteriaId": "8E7D1E25-9E12-451F-A454-78560153CF86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*", "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*", "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "F5784365-ACFB-4391-99C2-8B5B525039B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n de comandos contra un dispositivo afectado. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los archivos de configuraci\u00f3n XML por parte de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo de configuraci\u00f3n XML manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante inyectar comandos al sistema operativo subyacente con privilegios de superusuario." } ], "id": "CVE-2025-20184", "lastModified": "2025-08-08T17:11:23.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.697", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-06 17:15
Modified
2025-08-07 19:08
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*", "matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*", "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*", "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*", "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*", "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*", "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*", "matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*", "matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*", "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*", "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*", "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*", "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*", "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Secure Email Gateway y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20504", "lastModified": "2025-08-07T19:08:29.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-11-06T17:15:16.053", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }