Vulnerabilites related to cisco - secure_web_appliance_s396
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-05 19:28
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Impacted products
Vendor Product Version
cisco asyncos 11.8.0-414
cisco asyncos 11.8.0-429
cisco asyncos 11.8.0-453
cisco asyncos 11.8.1-023
cisco asyncos 11.8.3-018
cisco asyncos 11.8.3-021
cisco asyncos 11.8.4-004
cisco asyncos 12.0.1-268
cisco asyncos 12.0.1-334
cisco asyncos 12.0.2-004
cisco asyncos 12.0.2-012
cisco asyncos 12.0.3-005
cisco asyncos 12.0.3-007
cisco asyncos 12.0.4-002
cisco asyncos 12.0.5-011
cisco asyncos 12.5.1-011
cisco asyncos 12.5.1-043
cisco asyncos 12.5.2-007
cisco asyncos 12.5.2-011
cisco asyncos 12.5.3-002
cisco asyncos 12.5.4-005
cisco asyncos 12.5.4-011
cisco asyncos 12.5.5-004
cisco asyncos 12.5.5-005
cisco asyncos 12.5.5-008
cisco asyncos 12.5.6-008
cisco asyncos 14.0.1-014
cisco asyncos 14.0.1-040
cisco asyncos 14.0.1-053
cisco asyncos 14.0.1-503
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.0.5-007
cisco asyncos 14.1.0-032
cisco asyncos 14.1.0-041
cisco asyncos 14.1.0-047
cisco asyncos 14.5.0-498
cisco asyncos 14.5.0-537
cisco asyncos 14.5.0-673
cisco asyncos 14.5.1-008
cisco asyncos 14.5.1-016
cisco asyncos 14.5.1-510
cisco asyncos 14.5.1-607
cisco asyncos 14.5.2-011
cisco asyncos 14.5.3-033
cisco asyncos 15.0.0-322
cisco asyncos 15.0.0-355
cisco asyncos 15.1.0-287
cisco asyncos 15.2.0-116
cisco asyncos 15.2.0-164
cisco secure_web_appliance_virtual_s1000v -
cisco secure_web_appliance_virtual_s100v -
cisco secure_web_appliance_virtual_s300v -
cisco secure_web_appliance_virtual_s600v -
cisco secure_web_appliance_s196 -
cisco secure_web_appliance_s396 -
cisco secure_web_appliance_s696 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*",
              "matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*",
              "matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*",
              "matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
              "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en una implementaci\u00f3n basada en pol\u00edticas de Cisco Application Visibility and Control (AVC) de Cisco AsyncOS Software para Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto no autenticado eluda el esc\u00e1ner antivirus y descargue un archivo malicioso en un endpoint. La vulnerabilidad se debe a una gesti\u00f3n inadecuada de un encabezado de solicitud de rango manipulado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP con un encabezado de solicitud de rango manipulado a trav\u00e9s del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante eluda el esc\u00e1ner antivirus y descargue malware en el endpoint sin que Cisco Secure Web Appliance lo detecte."
    }
  ],
  "id": "CVE-2025-20183",
  "lastModified": "2025-08-05T19:28:30.367",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-05T17:15:25.527",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-07 17:10
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
cisco asyncos 11.7.0-406
cisco asyncos 11.7.0-418
cisco asyncos 11.7.1-006
cisco asyncos 11.7.1-020
cisco asyncos 11.7.1-049
cisco asyncos 11.7.2-011
cisco asyncos 11.8.0-414
cisco asyncos 11.8.1-023
cisco asyncos 11.8.3-018
cisco asyncos 11.8.3-021
cisco asyncos 12.0.1-268
cisco asyncos 12.0.3-007
cisco asyncos 12.5.1-011
cisco asyncos 12.5.2-007
cisco asyncos 12.5.4-005
cisco asyncos 12.5.5-004
cisco asyncos 12.5.6-008
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.5.0-498
cisco asyncos 14.5.1-016
cisco asyncos 15.0.0-322
cisco secure_web_appliance_virtual_s1000v -
cisco secure_web_appliance_virtual_s100v -
cisco secure_web_appliance_virtual_s300v -
cisco secure_web_appliance_virtual_s600v -
cisco secure_web_appliance_s196 -
cisco secure_web_appliance_s396 -
cisco secure_web_appliance_s696 -
cisco secure_email_and_web_manager_virtual_appliance_m100v -
cisco secure_email_and_web_manager_virtual_appliance_m300v -
cisco secure_email_and_web_manager_virtual_appliance_m600v -
cisco asyncos 9.0.0-087
cisco asyncos 11.0.0-115
cisco asyncos 11.0.1-161
cisco asyncos 11.5.1-105
cisco asyncos 12.0.0-452
cisco asyncos 12.0.1-011
cisco asyncos 12.5.0-636
cisco asyncos 12.5.0-658
cisco asyncos 12.5.0-670
cisco asyncos 12.5.0-678
cisco asyncos 12.8.1-002
cisco asyncos 12.8.1-021
cisco asyncos 13.0.0-277
cisco asyncos 13.6.2-078
cisco asyncos 13.8.1-068
cisco asyncos 13.8.1-074
cisco asyncos 13.8.1-108
cisco asyncos 14.0.0-404
cisco asyncos 14.1.0-223
cisco asyncos 14.1.0-227
cisco asyncos 14.2.0-212
cisco asyncos 14.2.0-224
cisco asyncos 14.2.1-020
cisco asyncos 14.3.0-120
cisco asyncos 15.0.0-334
cisco secure_email_and_web_manager_m170 -
cisco secure_email_and_web_manager_m190 -
cisco secure_email_and_web_manager_m195 -
cisco secure_email_and_web_manager_m380 -
cisco secure_email_and_web_manager_m390 -
cisco secure_email_and_web_manager_m390x -
cisco secure_email_and_web_manager_m395 -
cisco secure_email_and_web_manager_m680 -
cisco secure_email_and_web_manager_m690 -
cisco secure_email_and_web_manager_m690x -
cisco secure_email_and_web_manager_m695 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*",
              "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:9.0.0-087:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A641361-8EE6-445E-9EB4-391E69BB744B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.0.0-115:*:*:*:*:*:*:*",
              "matchCriteriaId": "866979C3-4EFE-4590-AD48-D181C5A5E05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.0.1-161:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A0FCF6-12DB-4054-BBDB-96AA0892C3ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.5.1-105:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF576F13-9097-4F7D-A0C8-57DEC3A68429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-452:*:*:*:*:*:*:*",
              "matchCriteriaId": "6271A5F1-9BC0-4106-9D5E-C32B4190FCB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "09531E94-0350-45E5-85B1-BA185074120F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-636:*:*:*:*:*:*:*",
              "matchCriteriaId": "C809B0DD-78F7-4282-AA6C-7D1203616BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-658:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF649DC-97E4-4C9E-BFE9-D35501229AA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-670:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E0C6D6-37B2-4781-837A-4C2C1656FF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-678:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDAAADB-25F1-4498-A0C9-0CBB4D19ECC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "80439833-447F-4582-B1FA-278306ABFE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CB6A5B-34EE-4958-ACB5-6433E8C0014D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18D9472-A7E4-4083-9369-DBA97A40022B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A1365DA-3163-4CFF-9F48-1998C9F6A29B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C5B0C94-A72F-4B5A-A9F8-00EF60D6C001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C14467-2836-4FDF-8B4B-670D08511614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50DAB07-5582-47C8-A0B0-7C0DA63DC70A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*",
              "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\rThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email and Web Manager y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador."
    }
  ],
  "id": "CVE-2024-20256",
  "lastModified": "2025-08-07T17:10:32.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-15T18:15:08.720",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-15 16:15
Modified
2025-08-11 17:44
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de Cisco\u0026#xa0;AsyncOS para Cisco\u0026#xa0;Secure Web Appliance, anteriormente Cisco\u0026#xa0;Web Security Appliance (WSA),\u0026#xa0;podr\u00eda permitir que un atacante remoto autenticado realice una inyecci\u00f3n de comandos y eleve los privilegios a superusuario. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la interfaz web. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el sistema y enviando un paquete HTTP dise\u00f1ado al dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a superusuario. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de solo lectura. Cisco\u0026#xa0;ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad. Atenci\u00f3n: la simplificaci\u00f3n de la cartera de Cisco incluye el cambio de nombre de los productos de seguridad bajo una sola marca: Cisco\u0026#xa0;Secure. Para obtener m\u00e1s informaci\u00f3n, consulte."
    }
  ],
  "id": "CVE-2022-20871",
  "lastModified": "2025-08-11T17:44:07.837",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-15T16:15:23.757",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-08 17:11
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Impacted products
Vendor Product Version
cisco asyncos 13.0.0-392
cisco asyncos 13.0.5-007
cisco asyncos 13.5.1-277
cisco asyncos 13.5.4-038
cisco asyncos 14.0.0-698
cisco asyncos 14.2.0-620
cisco asyncos 14.2.1-020
cisco asyncos 14.3.0-032
cisco asyncos 15.0.0-104
cisco asyncos 15.0.1-030
cisco asyncos 15.0.3-002
cisco asyncos 15.5.0-048
cisco asyncos 15.5.1-055
cisco asyncos 15.5.2-018
cisco asyncos 15.5.3-022
cisco secure_email_gateway_virtual_appliance_c100v -
cisco secure_email_gateway_virtual_appliance_c300v -
cisco secure_email_gateway_virtual_appliance_c600v -
cisco secure_email_gateway_c195 -
cisco secure_email_gateway_c395 -
cisco secure_email_gateway_c695 -
cisco asyncos 11.8.0-414
cisco asyncos 11.8.0-429
cisco asyncos 11.8.0-453
cisco asyncos 11.8.1-023
cisco asyncos 11.8.3-018
cisco asyncos 11.8.3-021
cisco asyncos 11.8.4-004
cisco asyncos 12.0.1-268
cisco asyncos 12.0.1-334
cisco asyncos 12.0.2-004
cisco asyncos 12.0.2-012
cisco asyncos 12.0.3-005
cisco asyncos 12.0.3-007
cisco asyncos 12.0.4-002
cisco asyncos 12.0.5-011
cisco asyncos 12.5.1-011
cisco asyncos 12.5.1-043
cisco asyncos 12.5.2-007
cisco asyncos 12.5.2-011
cisco asyncos 12.5.3-002
cisco asyncos 12.5.4-005
cisco asyncos 12.5.4-011
cisco asyncos 12.5.5-004
cisco asyncos 12.5.5-005
cisco asyncos 12.5.5-008
cisco asyncos 12.5.6-008
cisco asyncos 14.0.1-014
cisco asyncos 14.0.1-040
cisco asyncos 14.0.1-053
cisco asyncos 14.0.1-503
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.0.5-007
cisco asyncos 14.1.0-032
cisco asyncos 14.1.0-041
cisco asyncos 14.1.0-047
cisco asyncos 14.5.0-498
cisco asyncos 14.5.0-537
cisco asyncos 14.5.0-673
cisco asyncos 14.5.1-008
cisco asyncos 14.5.1-016
cisco asyncos 14.5.1-510
cisco asyncos 14.5.1-607
cisco asyncos 14.5.2-011
cisco asyncos 14.5.3-033
cisco asyncos 15.0.0-322
cisco asyncos 15.0.0-355
cisco asyncos 15.0.1-004
cisco asyncos 15.1.0-287
cisco asyncos 15.2.0-116
cisco asyncos 15.2.0-164
cisco asyncos 15.2.1-011
cisco secure_web_appliance_virtual_s1000v -
cisco secure_web_appliance_virtual_s100v -
cisco secure_web_appliance_virtual_s300v -
cisco secure_web_appliance_virtual_s600v -
cisco secure_web_appliance_s196 -
cisco secure_web_appliance_s396 -
cisco secure_web_appliance_s696 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
              "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
              "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
              "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
              "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.3-022:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72D8A34-34BF-4390-B244-23AEAC08ACD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*",
              "matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*",
              "matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*",
              "matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
              "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E7D1E25-9E12-451F-A454-78560153CF86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5784365-ACFB-4391-99C2-8B5B525039B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n de comandos contra un dispositivo afectado. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los archivos de configuraci\u00f3n XML por parte de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo de configuraci\u00f3n XML manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante inyectar comandos al sistema operativo subyacente con privilegios de superusuario."
    }
  ],
  "id": "CVE-2025-20184",
  "lastModified": "2025-08-08T17:11:23.557",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-05T17:15:25.697",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-06 17:15
Modified
2025-08-07 19:08
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
cisco asyncos 14.0.0-698
cisco asyncos 14.2.0-620
cisco asyncos 14.2.1-020
cisco asyncos 14.3.0-032
cisco asyncos 15.0.0-104
cisco asyncos 15.0.1-030
cisco asyncos 15.5.0-048
cisco asyncos 15.5.1-055
cisco secure_email_gateway_virtual_appliance_c100v -
cisco secure_email_gateway_virtual_appliance_c300v -
cisco secure_email_gateway_virtual_appliance_c600v -
cisco secure_email_gateway_c195 -
cisco secure_email_gateway_c395 -
cisco secure_email_gateway_c695 -
cisco asyncos 14.0.0-404
cisco asyncos 14.1.0-223
cisco asyncos 14.1.0-227
cisco asyncos 14.2.0-212
cisco asyncos 14.2.0-224
cisco asyncos 14.2.1-020
cisco asyncos 14.3.0-120
cisco asyncos 15.0.0-334
cisco asyncos 15.5.1-024
cisco asyncos 15.5.1-029
cisco secure_email_and_web_manager_virtual_appliance_m100v -
cisco secure_email_and_web_manager_virtual_appliance_m300v -
cisco secure_email_and_web_manager_virtual_appliance_m600v -
cisco secure_email_and_web_manager_m170 -
cisco secure_email_and_web_manager_m190 -
cisco secure_email_and_web_manager_m195 -
cisco secure_email_and_web_manager_m380 -
cisco secure_email_and_web_manager_m390 -
cisco secure_email_and_web_manager_m390x -
cisco secure_email_and_web_manager_m395 -
cisco secure_email_and_web_manager_m680 -
cisco secure_email_and_web_manager_m690 -
cisco secure_email_and_web_manager_m690x -
cisco secure_email_and_web_manager_m695 -
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.0.5-007
cisco asyncos 14.1.0-032
cisco asyncos 14.1.0-041
cisco asyncos 14.1.0-047
cisco asyncos 14.5.0-498
cisco asyncos 14.5.1-008
cisco asyncos 14.5.1-016
cisco asyncos 14.5.1-510
cisco asyncos 14.5.1-607
cisco asyncos 14.5.2-011
cisco asyncos 14.5.3-033
cisco asyncos 15.0.0-322
cisco asyncos 15.0.0-355
cisco asyncos 15.1.0-287
cisco asyncos 15.2.0-116
cisco asyncos 15.2.0-164
cisco secure_web_appliance_virtual_s1000v -
cisco secure_web_appliance_virtual_s100v -
cisco secure_web_appliance_virtual_s300v -
cisco secure_web_appliance_virtual_s600v -
cisco secure_web_appliance_s196 -
cisco secure_web_appliance_s396 -
cisco secure_web_appliance_s696 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*",
              "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*",
              "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*",
              "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*",
              "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*",
              "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*",
              "matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*",
              "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Secure Email Gateway y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador."
    }
  ],
  "id": "CVE-2024-20504",
  "lastModified": "2025-08-07T19:08:29.290",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-06T17:15:16.053",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-80"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-17 17:15
Modified
2025-08-08 01:55
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
Impacted products
Vendor Product Version
cisco asyncos 11.7.0-406
cisco asyncos 11.7.0-418
cisco asyncos 11.7.1-006
cisco asyncos 11.7.1-020
cisco asyncos 11.7.1-049
cisco asyncos 11.7.2-011
cisco asyncos 11.8.0-414
cisco asyncos 11.8.1-023
cisco asyncos 11.8.3-018
cisco asyncos 11.8.3-021
cisco asyncos 12.0.1-268
cisco asyncos 12.0.3-007
cisco asyncos 12.5.1-011
cisco asyncos 12.5.2-007
cisco asyncos 12.5.4-005
cisco asyncos 12.5.5-004
cisco asyncos 12.5.6-008
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.0.5-007
cisco asyncos 14.5.0-498
cisco asyncos 14.5.1-016
cisco asyncos 14.5.2-011
cisco asyncos 15.0.0-322
cisco asyncos 15.0.0-355
cisco asyncos 15.1.0-287
cisco secure_web_appliance_virtual_s1000v -
cisco secure_web_appliance_virtual_s100v -
cisco secure_web_appliance_virtual_s300v -
cisco secure_web_appliance_virtual_s600v -
cisco secure_web_appliance_s196 -
cisco secure_web_appliance_s396 -
cisco secure_web_appliance_s696 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*",
              "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco AsyncOS para Secure Web Appliance podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios y eleve privilegios a root. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la CLI. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en el sistema y ejecutando un comando manipulado en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de invitado."
    }
  ],
  "id": "CVE-2024-20435",
  "lastModified": "2025-08-08T01:55:41.180",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-17T17:15:14.787",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-250"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

CVE-2022-20871 (GCVE-0-2022-20871)
Vulnerability from cvelistv5
Published
2024-11-15 15:27
Modified
2024-11-15 15:35
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
Impacted products
Vendor Product Version
Cisco Cisco Secure Web Appliance Version: 12.5.3-002
Version: 14.1.0-032
Version: 14.1.0-047
Version: 14.1.0-041
Version: 14.0.2-012
Version: 12.5.1-011
Version: 12.5.2-007
Version: 12.5.2-011
Version: 14.5.0-498
Version: 12.5.4-005
Version: 12.5.4-011
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20871",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:35:06.319558Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:35:23.825Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "12.5.3-002"
            },
            {
              "status": "affected",
              "version": "14.1.0-032"
            },
            {
              "status": "affected",
              "version": "14.1.0-047"
            },
            {
              "status": "affected",
              "version": "14.1.0-041"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "12.5.1-011"
            },
            {
              "status": "affected",
              "version": "12.5.2-007"
            },
            {
              "status": "affected",
              "version": "12.5.2-011"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "12.5.4-005"
            },
            {
              "status": "affected",
              "version": "12.5.4-011"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:27:14.028Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-wsa-prv-esc-8PdRU8t8",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8"
        },
        {
          "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU"
        },
        {
          "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv"
        }
      ],
      "source": {
        "advisory": "cisco-sa-wsa-prv-esc-8PdRU8t8",
        "defects": [
          "CSCwb92675"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20871",
    "datePublished": "2024-11-15T15:27:14.028Z",
    "dateReserved": "2021-11-02T13:28:29.183Z",
    "dateUpdated": "2024-11-15T15:35:23.825Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20435 (GCVE-0-2024-20435)
Vulnerability from cvelistv5
Published
2024-07-17 16:27
Modified
2024-08-01 21:59
CWE
  • CWE-250 - Execution with Unnecessary Privileges
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
Impacted products
Vendor Product Version
Cisco Cisco Secure Web Appliance Version: 11.7.0-406
Version: 11.7.0-418
Version: 11.7.1-049
Version: 11.7.1-006
Version: 11.7.1-020
Version: 11.7.2-011
Version: 11.8.0-414
Version: 11.8.1-023
Version: 11.8.3-018
Version: 11.8.3-021
Version: 12.0.1-268
Version: 12.0.3-007
Version: 12.5.2-007
Version: 12.5.1-011
Version: 12.5.4-005
Version: 12.5.5-004
Version: 12.5.6-008
Version: 14.5.0-498
Version: 14.5.1-016
Version: 14.5.2-011
Version: 14.0.3-014
Version: 14.0.2-012
Version: 14.0.4-005
Version: 14.0.5-007
Version: 15.0.0-322
Version: 15.0.0-355
Version: 15.1.0-287
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.0-406:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.0-418:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-006:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-020:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-049:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.7.2-011:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.8.0-414:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.8.1-023:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.8.3-018:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:11.8.3-021:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.0.1-268:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.0.3-007:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.5.1-011:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.5.2-007:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.5.4-005:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.5.5-004:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:12.5.6-008:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.0.2-012:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.0.3-014:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.0.4-005:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.0.5-007:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.5.0-498:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.5.1-016:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:14.5.2-011:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:15.0.0-322:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:15.0.0-355:*:*:*:*:*:*:*",
              "cpe:2.3:h:cisco:secure_web_appliance:15.1.0-287:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "secure_web_appliance",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "11.7.0-406"
              },
              {
                "status": "affected",
                "version": "11.7.0-418"
              },
              {
                "status": "affected",
                "version": "11.7.1-006"
              },
              {
                "status": "affected",
                "version": "11.7.1-020"
              },
              {
                "status": "affected",
                "version": "11.7.1-049"
              },
              {
                "status": "affected",
                "version": "11.7.2-011"
              },
              {
                "status": "affected",
                "version": "11.8.0-414"
              },
              {
                "status": "affected",
                "version": "11.8.1-023"
              },
              {
                "status": "affected",
                "version": "11.8.3-018"
              },
              {
                "status": "affected",
                "version": "11.8.3-021"
              },
              {
                "status": "affected",
                "version": "12.0.1-268"
              },
              {
                "status": "affected",
                "version": "12.0.3-007"
              },
              {
                "status": "affected",
                "version": "12.5.1-011"
              },
              {
                "status": "affected",
                "version": "12.5.2-007"
              },
              {
                "status": "affected",
                "version": "12.5.4-005"
              },
              {
                "status": "affected",
                "version": "12.5.5-004"
              },
              {
                "status": "affected",
                "version": "12.5.6-008"
              },
              {
                "status": "affected",
                "version": "14.0.2-012"
              },
              {
                "status": "affected",
                "version": "14.0.3-014"
              },
              {
                "status": "affected",
                "version": "14.0.4-005"
              },
              {
                "status": "affected",
                "version": "14.0.5-007"
              },
              {
                "status": "affected",
                "version": "14.5.0-498"
              },
              {
                "status": "affected",
                "version": "14.5.1-016"
              },
              {
                "status": "affected",
                "version": "14.5.2-011"
              },
              {
                "status": "affected",
                "version": "15.0.0-322"
              },
              {
                "status": "affected",
                "version": "15.0.0-355"
              },
              {
                "status": "affected",
                "version": "15.1.0-287"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20435",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-17T17:15:02.287832Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-17T17:28:04.667Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.297Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-swa-priv-esc-7uHpZsCC",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.7.0-406"
            },
            {
              "status": "affected",
              "version": "11.7.0-418"
            },
            {
              "status": "affected",
              "version": "11.7.1-049"
            },
            {
              "status": "affected",
              "version": "11.7.1-006"
            },
            {
              "status": "affected",
              "version": "11.7.1-020"
            },
            {
              "status": "affected",
              "version": "11.7.2-011"
            },
            {
              "status": "affected",
              "version": "11.8.0-414"
            },
            {
              "status": "affected",
              "version": "11.8.1-023"
            },
            {
              "status": "affected",
              "version": "11.8.3-018"
            },
            {
              "status": "affected",
              "version": "11.8.3-021"
            },
            {
              "status": "affected",
              "version": "12.0.1-268"
            },
            {
              "status": "affected",
              "version": "12.0.3-007"
            },
            {
              "status": "affected",
              "version": "12.5.2-007"
            },
            {
              "status": "affected",
              "version": "12.5.1-011"
            },
            {
              "status": "affected",
              "version": "12.5.4-005"
            },
            {
              "status": "affected",
              "version": "12.5.5-004"
            },
            {
              "status": "affected",
              "version": "12.5.6-008"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "14.5.1-016"
            },
            {
              "status": "affected",
              "version": "14.5.2-011"
            },
            {
              "status": "affected",
              "version": "14.0.3-014"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "14.0.4-005"
            },
            {
              "status": "affected",
              "version": "14.0.5-007"
            },
            {
              "status": "affected",
              "version": "15.0.0-322"
            },
            {
              "status": "affected",
              "version": "15.0.0-355"
            },
            {
              "status": "affected",
              "version": "15.1.0-287"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "Execution with Unnecessary Privileges",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-17T16:27:59.858Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-swa-priv-esc-7uHpZsCC",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC"
        }
      ],
      "source": {
        "advisory": "cisco-sa-swa-priv-esc-7uHpZsCC",
        "defects": [
          "CSCwj30015"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20435",
    "datePublished": "2024-07-17T16:27:59.858Z",
    "dateReserved": "2023-11-08T15:08:07.667Z",
    "dateUpdated": "2024-08-01T21:59:42.297Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20183 (GCVE-0-2025-20183)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:00
CWE
  • CWE-20 - Improper Input Validation
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Impacted products
Vendor Product Version
Cisco Cisco Secure Web Appliance Version: 11.8.0-453
Version: 12.5.3-002
Version: 12.0.3-007
Version: 12.0.3-005
Version: 14.1.0-032
Version: 14.1.0-047
Version: 14.1.0-041
Version: 12.0.4-002
Version: 14.0.2-012
Version: 11.8.0-414
Version: 12.0.1-268
Version: 11.8.1-023
Version: 11.8.3-021
Version: 11.8.3-018
Version: 12.5.1-011
Version: 11.8.4-004
Version: 12.5.2-007
Version: 12.5.2-011
Version: 14.5.0-498
Version: 12.5.4-005
Version: 12.5.4-011
Version: 12.0.5-011
Version: 14.0.3-014
Version: 12.5.5-004
Version: 12.5.5-005
Version: 12.5.5-008
Version: 14.0.4-005
Version: 14.5.1-008
Version: 14.5.1-016
Version: 15.0.0-355
Version: 15.0.0-322
Version: 12.5.6-008
Version: 15.1.0-287
Version: 14.5.2-011
Version: 15.2.0-116
Version: 14.0.5-007
Version: 15.2.0-164
Version: 14.5.1-510
Version: 12.0.2-012
Version: 12.0.2-004
Version: 14.5.1-607
Version: 14.5.3-033
Version: 14.5.0-673
Version: 14.5.0-537
Version: 12.0.1-334
Version: 14.0.1-503
Version: 14.0.1-053
Version: 11.8.0-429
Version: 14.0.1-040
Version: 14.0.1-014
Version: 12.5.1-043
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20183",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-05T17:00:32.365680Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-05T17:00:50.686Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.8.0-453"
            },
            {
              "status": "affected",
              "version": "12.5.3-002"
            },
            {
              "status": "affected",
              "version": "12.0.3-007"
            },
            {
              "status": "affected",
              "version": "12.0.3-005"
            },
            {
              "status": "affected",
              "version": "14.1.0-032"
            },
            {
              "status": "affected",
              "version": "14.1.0-047"
            },
            {
              "status": "affected",
              "version": "14.1.0-041"
            },
            {
              "status": "affected",
              "version": "12.0.4-002"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "11.8.0-414"
            },
            {
              "status": "affected",
              "version": "12.0.1-268"
            },
            {
              "status": "affected",
              "version": "11.8.1-023"
            },
            {
              "status": "affected",
              "version": "11.8.3-021"
            },
            {
              "status": "affected",
              "version": "11.8.3-018"
            },
            {
              "status": "affected",
              "version": "12.5.1-011"
            },
            {
              "status": "affected",
              "version": "11.8.4-004"
            },
            {
              "status": "affected",
              "version": "12.5.2-007"
            },
            {
              "status": "affected",
              "version": "12.5.2-011"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "12.5.4-005"
            },
            {
              "status": "affected",
              "version": "12.5.4-011"
            },
            {
              "status": "affected",
              "version": "12.0.5-011"
            },
            {
              "status": "affected",
              "version": "14.0.3-014"
            },
            {
              "status": "affected",
              "version": "12.5.5-004"
            },
            {
              "status": "affected",
              "version": "12.5.5-005"
            },
            {
              "status": "affected",
              "version": "12.5.5-008"
            },
            {
              "status": "affected",
              "version": "14.0.4-005"
            },
            {
              "status": "affected",
              "version": "14.5.1-008"
            },
            {
              "status": "affected",
              "version": "14.5.1-016"
            },
            {
              "status": "affected",
              "version": "15.0.0-355"
            },
            {
              "status": "affected",
              "version": "15.0.0-322"
            },
            {
              "status": "affected",
              "version": "12.5.6-008"
            },
            {
              "status": "affected",
              "version": "15.1.0-287"
            },
            {
              "status": "affected",
              "version": "14.5.2-011"
            },
            {
              "status": "affected",
              "version": "15.2.0-116"
            },
            {
              "status": "affected",
              "version": "14.0.5-007"
            },
            {
              "status": "affected",
              "version": "15.2.0-164"
            },
            {
              "status": "affected",
              "version": "14.5.1-510"
            },
            {
              "status": "affected",
              "version": "12.0.2-012"
            },
            {
              "status": "affected",
              "version": "12.0.2-004"
            },
            {
              "status": "affected",
              "version": "14.5.1-607"
            },
            {
              "status": "affected",
              "version": "14.5.3-033"
            },
            {
              "status": "affected",
              "version": "14.5.0-673"
            },
            {
              "status": "affected",
              "version": "14.5.0-537"
            },
            {
              "status": "affected",
              "version": "12.0.1-334"
            },
            {
              "status": "affected",
              "version": "14.0.1-503"
            },
            {
              "status": "affected",
              "version": "14.0.1-053"
            },
            {
              "status": "affected",
              "version": "11.8.0-429"
            },
            {
              "status": "affected",
              "version": "14.0.1-040"
            },
            {
              "status": "affected",
              "version": "14.0.1-014"
            },
            {
              "status": "affected",
              "version": "12.5.1-043"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-05T16:14:21.787Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-swa-range-bypass-2BsEHYSu",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu"
        }
      ],
      "source": {
        "advisory": "cisco-sa-swa-range-bypass-2BsEHYSu",
        "defects": [
          "CSCwk58287"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Secure Web Appliance Range Request Bypass Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20183",
    "datePublished": "2025-02-05T16:14:21.787Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-02-05T17:00:50.686Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20184 (GCVE-0-2025-20184)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:00
CWE
  • CWE-20 - Improper Input Validation
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Impacted products
Vendor Product Version
Cisco Cisco Secure Email Version: 14.0.0-698
Version: 13.5.1-277
Version: 13.0.0-392
Version: 14.2.0-620
Version: 13.0.5-007
Version: 13.5.4-038
Version: 14.2.1-020
Version: 14.3.0-032
Version: 15.0.0-104
Version: 15.0.1-030
Version: 15.5.0-048
Version: 15.5.1-055
Version: 15.5.2-018
Version: 15.0.3-002
Version: 15.5.3-022
Create a notification for this product.
   Cisco Cisco Secure Web Appliance Version: 11.8.0-453
Version: 12.5.3-002
Version: 12.0.3-007
Version: 12.0.3-005
Version: 14.1.0-032
Version: 14.1.0-047
Version: 14.1.0-041
Version: 12.0.4-002
Version: 14.0.2-012
Version: 11.8.0-414
Version: 12.0.1-268
Version: 11.8.1-023
Version: 11.8.3-021
Version: 11.8.3-018
Version: 12.5.1-011
Version: 11.8.4-004
Version: 12.5.2-007
Version: 12.5.2-011
Version: 14.5.0-498
Version: 12.5.4-005
Version: 12.5.4-011
Version: 12.0.5-011
Version: 14.0.3-014
Version: 12.5.5-004
Version: 12.5.5-005
Version: 12.5.5-008
Version: 14.0.4-005
Version: 14.5.1-008
Version: 14.5.1-016
Version: 15.0.0-355
Version: 15.0.0-322
Version: 12.5.6-008
Version: 15.1.0-287
Version: 14.5.2-011
Version: 15.2.0-116
Version: 14.0.5-007
Version: 15.2.0-164
Version: 14.5.1-510
Version: 12.0.2-012
Version: 12.0.2-004
Version: 14.5.1-607
Version: 14.5.3-033
Version: 15.0.1-004
Version: 15.2.1-011
Version: 14.5.0-673
Version: 14.5.0-537
Version: 12.0.1-334
Version: 14.0.1-503
Version: 14.0.1-053
Version: 11.8.0-429
Version: 14.0.1-040
Version: 14.0.1-014
Version: 12.5.1-043
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20184",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-05T16:59:57.945223Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-05T17:00:15.021Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "14.0.0-698"
            },
            {
              "status": "affected",
              "version": "13.5.1-277"
            },
            {
              "status": "affected",
              "version": "13.0.0-392"
            },
            {
              "status": "affected",
              "version": "14.2.0-620"
            },
            {
              "status": "affected",
              "version": "13.0.5-007"
            },
            {
              "status": "affected",
              "version": "13.5.4-038"
            },
            {
              "status": "affected",
              "version": "14.2.1-020"
            },
            {
              "status": "affected",
              "version": "14.3.0-032"
            },
            {
              "status": "affected",
              "version": "15.0.0-104"
            },
            {
              "status": "affected",
              "version": "15.0.1-030"
            },
            {
              "status": "affected",
              "version": "15.5.0-048"
            },
            {
              "status": "affected",
              "version": "15.5.1-055"
            },
            {
              "status": "affected",
              "version": "15.5.2-018"
            },
            {
              "status": "affected",
              "version": "15.0.3-002"
            },
            {
              "status": "affected",
              "version": "15.5.3-022"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.8.0-453"
            },
            {
              "status": "affected",
              "version": "12.5.3-002"
            },
            {
              "status": "affected",
              "version": "12.0.3-007"
            },
            {
              "status": "affected",
              "version": "12.0.3-005"
            },
            {
              "status": "affected",
              "version": "14.1.0-032"
            },
            {
              "status": "affected",
              "version": "14.1.0-047"
            },
            {
              "status": "affected",
              "version": "14.1.0-041"
            },
            {
              "status": "affected",
              "version": "12.0.4-002"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "11.8.0-414"
            },
            {
              "status": "affected",
              "version": "12.0.1-268"
            },
            {
              "status": "affected",
              "version": "11.8.1-023"
            },
            {
              "status": "affected",
              "version": "11.8.3-021"
            },
            {
              "status": "affected",
              "version": "11.8.3-018"
            },
            {
              "status": "affected",
              "version": "12.5.1-011"
            },
            {
              "status": "affected",
              "version": "11.8.4-004"
            },
            {
              "status": "affected",
              "version": "12.5.2-007"
            },
            {
              "status": "affected",
              "version": "12.5.2-011"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "12.5.4-005"
            },
            {
              "status": "affected",
              "version": "12.5.4-011"
            },
            {
              "status": "affected",
              "version": "12.0.5-011"
            },
            {
              "status": "affected",
              "version": "14.0.3-014"
            },
            {
              "status": "affected",
              "version": "12.5.5-004"
            },
            {
              "status": "affected",
              "version": "12.5.5-005"
            },
            {
              "status": "affected",
              "version": "12.5.5-008"
            },
            {
              "status": "affected",
              "version": "14.0.4-005"
            },
            {
              "status": "affected",
              "version": "14.5.1-008"
            },
            {
              "status": "affected",
              "version": "14.5.1-016"
            },
            {
              "status": "affected",
              "version": "15.0.0-355"
            },
            {
              "status": "affected",
              "version": "15.0.0-322"
            },
            {
              "status": "affected",
              "version": "12.5.6-008"
            },
            {
              "status": "affected",
              "version": "15.1.0-287"
            },
            {
              "status": "affected",
              "version": "14.5.2-011"
            },
            {
              "status": "affected",
              "version": "15.2.0-116"
            },
            {
              "status": "affected",
              "version": "14.0.5-007"
            },
            {
              "status": "affected",
              "version": "15.2.0-164"
            },
            {
              "status": "affected",
              "version": "14.5.1-510"
            },
            {
              "status": "affected",
              "version": "12.0.2-012"
            },
            {
              "status": "affected",
              "version": "12.0.2-004"
            },
            {
              "status": "affected",
              "version": "14.5.1-607"
            },
            {
              "status": "affected",
              "version": "14.5.3-033"
            },
            {
              "status": "affected",
              "version": "15.0.1-004"
            },
            {
              "status": "affected",
              "version": "15.2.1-011"
            },
            {
              "status": "affected",
              "version": "14.5.0-673"
            },
            {
              "status": "affected",
              "version": "14.5.0-537"
            },
            {
              "status": "affected",
              "version": "12.0.1-334"
            },
            {
              "status": "affected",
              "version": "14.0.1-503"
            },
            {
              "status": "affected",
              "version": "14.0.1-053"
            },
            {
              "status": "affected",
              "version": "11.8.0-429"
            },
            {
              "status": "affected",
              "version": "14.0.1-040"
            },
            {
              "status": "affected",
              "version": "14.0.1-014"
            },
            {
              "status": "affected",
              "version": "12.5.1-043"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-05T16:14:30.863Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34"
        }
      ],
      "source": {
        "advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34",
        "defects": [
          "CSCwk70559"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Secure Email and Web Manager and Secure Web Appliance Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20184",
    "datePublished": "2025-02-05T16:14:30.863Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-02-05T17:00:15.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20256 (GCVE-0-2024-20256)
Vulnerability from cvelistv5
Published
2024-05-15 17:56
Modified
2024-08-15 15:29
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Secure Web Appliance Version: 11.7.0-406
Version: 11.7.0-418
Version: 11.7.1-049
Version: 11.7.1-006
Version: 11.7.1-020
Version: 11.7.2-011
Version: 11.8.0-414
Version: 11.8.1-023
Version: 11.8.3-018
Version: 11.8.3-021
Version: 12.0.1-268
Version: 12.0.3-007
Version: 12.5.2-007
Version: 12.5.1-011
Version: 12.5.4-005
Version: 12.5.5-004
Version: 12.5.6-008
Version: 14.5.0-498
Version: 14.5.1-016
Version: 14.0.3-014
Version: 14.0.2-012
Version: 14.0.4-005
Version: 15.0.0-322
Create a notification for this product.
   Cisco Cisco Secure Email and Web Manager Version: 9.0.0-087
Version: 11.0.0-115
Version: 11.0.1-161
Version: 11.5.1-105
Version: 12.0.0-452
Version: 12.0.1-011
Version: 12.5.0-636
Version: 12.5.0-658
Version: 12.5.0-678
Version: 12.5.0-670
Version: 13.0.0-277
Version: 13.6.2-078
Version: 13.8.1-068
Version: 13.8.1-074
Version: 13.8.1-108
Version: 12.8.1-002
Version: 12.8.1-021
Version: 14.0.0-404
Version: 14.1.0-223
Version: 14.1.0-227
Version: 14.2.0-212
Version: 14.2.0-224
Version: 14.2.1-020
Version: 14.3.0-120
Version: 15.0.0-334
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:31.613Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20256",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-15T18:47:15.332751Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T15:29:20.282Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.7.0-406"
            },
            {
              "status": "affected",
              "version": "11.7.0-418"
            },
            {
              "status": "affected",
              "version": "11.7.1-049"
            },
            {
              "status": "affected",
              "version": "11.7.1-006"
            },
            {
              "status": "affected",
              "version": "11.7.1-020"
            },
            {
              "status": "affected",
              "version": "11.7.2-011"
            },
            {
              "status": "affected",
              "version": "11.8.0-414"
            },
            {
              "status": "affected",
              "version": "11.8.1-023"
            },
            {
              "status": "affected",
              "version": "11.8.3-018"
            },
            {
              "status": "affected",
              "version": "11.8.3-021"
            },
            {
              "status": "affected",
              "version": "12.0.1-268"
            },
            {
              "status": "affected",
              "version": "12.0.3-007"
            },
            {
              "status": "affected",
              "version": "12.5.2-007"
            },
            {
              "status": "affected",
              "version": "12.5.1-011"
            },
            {
              "status": "affected",
              "version": "12.5.4-005"
            },
            {
              "status": "affected",
              "version": "12.5.5-004"
            },
            {
              "status": "affected",
              "version": "12.5.6-008"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "14.5.1-016"
            },
            {
              "status": "affected",
              "version": "14.0.3-014"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "14.0.4-005"
            },
            {
              "status": "affected",
              "version": "15.0.0-322"
            }
          ]
        },
        {
          "product": "Cisco Secure Email and Web Manager",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.0-087"
            },
            {
              "status": "affected",
              "version": "11.0.0-115"
            },
            {
              "status": "affected",
              "version": "11.0.1-161"
            },
            {
              "status": "affected",
              "version": "11.5.1-105"
            },
            {
              "status": "affected",
              "version": "12.0.0-452"
            },
            {
              "status": "affected",
              "version": "12.0.1-011"
            },
            {
              "status": "affected",
              "version": "12.5.0-636"
            },
            {
              "status": "affected",
              "version": "12.5.0-658"
            },
            {
              "status": "affected",
              "version": "12.5.0-678"
            },
            {
              "status": "affected",
              "version": "12.5.0-670"
            },
            {
              "status": "affected",
              "version": "13.0.0-277"
            },
            {
              "status": "affected",
              "version": "13.6.2-078"
            },
            {
              "status": "affected",
              "version": "13.8.1-068"
            },
            {
              "status": "affected",
              "version": "13.8.1-074"
            },
            {
              "status": "affected",
              "version": "13.8.1-108"
            },
            {
              "status": "affected",
              "version": "12.8.1-002"
            },
            {
              "status": "affected",
              "version": "12.8.1-021"
            },
            {
              "status": "affected",
              "version": "14.0.0-404"
            },
            {
              "status": "affected",
              "version": "14.1.0-223"
            },
            {
              "status": "affected",
              "version": "14.1.0-227"
            },
            {
              "status": "affected",
              "version": "14.2.0-212"
            },
            {
              "status": "affected",
              "version": "14.2.0-224"
            },
            {
              "status": "affected",
              "version": "14.2.1-020"
            },
            {
              "status": "affected",
              "version": "14.3.0-120"
            },
            {
              "status": "affected",
              "version": "15.0.0-334"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\rThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-15T17:56:38.074Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD"
        }
      ],
      "source": {
        "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
        "defects": [
          "CSCwe88788",
          "CSCwe91887"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20256",
    "datePublished": "2024-05-15T17:56:38.074Z",
    "dateReserved": "2023-11-08T15:08:07.623Z",
    "dateUpdated": "2024-08-15T15:29:20.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20504 (GCVE-0-2024-20504)
Vulnerability from cvelistv5
Published
2024-11-06 16:29
Modified
2024-11-06 17:05
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Secure Email Version: 14.0.0-698
Version: 14.2.0-620
Version: 14.2.1-020
Version: 14.3.0-032
Version: 15.0.0-104
Version: 15.0.1-030
Version: 15.5.0-048
Version: 15.5.1-055
Create a notification for this product.
   Cisco Cisco Secure Email and Web Manager Version: 14.0.0-404
Version: 14.1.0-223
Version: 14.1.0-227
Version: 14.2.0-212
Version: 14.2.0-224
Version: 14.2.1-020
Version: 14.3.0-120
Version: 15.0.0-334
Version: 15.5.1-024
Version: 15.5.1-029
Create a notification for this product.
   Cisco Cisco Secure Web Appliance Version: 14.1.0-032
Version: 14.1.0-047
Version: 14.1.0-041
Version: 14.0.2-012
Version: 14.5.0-498
Version: 14.0.3-014
Version: 14.0.4-005
Version: 14.5.1-008
Version: 14.5.1-016
Version: 15.0.0-355
Version: 15.0.0-322
Version: 15.1.0-287
Version: 14.5.2-011
Version: 15.2.0-116
Version: 14.0.5-007
Version: 15.2.0-164
Version: 14.5.1-510
Version: 14.5.1-607
Version: 14.5.3-033
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20504",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T17:05:32.372312Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T17:05:40.097Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "14.0.0-698"
            },
            {
              "status": "affected",
              "version": "14.2.0-620"
            },
            {
              "status": "affected",
              "version": "14.2.1-020"
            },
            {
              "status": "affected",
              "version": "14.3.0-032"
            },
            {
              "status": "affected",
              "version": "15.0.0-104"
            },
            {
              "status": "affected",
              "version": "15.0.1-030"
            },
            {
              "status": "affected",
              "version": "15.5.0-048"
            },
            {
              "status": "affected",
              "version": "15.5.1-055"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Email and Web Manager",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "14.0.0-404"
            },
            {
              "status": "affected",
              "version": "14.1.0-223"
            },
            {
              "status": "affected",
              "version": "14.1.0-227"
            },
            {
              "status": "affected",
              "version": "14.2.0-212"
            },
            {
              "status": "affected",
              "version": "14.2.0-224"
            },
            {
              "status": "affected",
              "version": "14.2.1-020"
            },
            {
              "status": "affected",
              "version": "14.3.0-120"
            },
            {
              "status": "affected",
              "version": "15.0.0-334"
            },
            {
              "status": "affected",
              "version": "15.5.1-024"
            },
            {
              "status": "affected",
              "version": "15.5.1-029"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Secure Web Appliance",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "14.1.0-032"
            },
            {
              "status": "affected",
              "version": "14.1.0-047"
            },
            {
              "status": "affected",
              "version": "14.1.0-041"
            },
            {
              "status": "affected",
              "version": "14.0.2-012"
            },
            {
              "status": "affected",
              "version": "14.5.0-498"
            },
            {
              "status": "affected",
              "version": "14.0.3-014"
            },
            {
              "status": "affected",
              "version": "14.0.4-005"
            },
            {
              "status": "affected",
              "version": "14.5.1-008"
            },
            {
              "status": "affected",
              "version": "14.5.1-016"
            },
            {
              "status": "affected",
              "version": "15.0.0-355"
            },
            {
              "status": "affected",
              "version": "15.0.0-322"
            },
            {
              "status": "affected",
              "version": "15.1.0-287"
            },
            {
              "status": "affected",
              "version": "14.5.2-011"
            },
            {
              "status": "affected",
              "version": "15.2.0-116"
            },
            {
              "status": "affected",
              "version": "14.0.5-007"
            },
            {
              "status": "affected",
              "version": "15.2.0-164"
            },
            {
              "status": "affected",
              "version": "14.5.1-510"
            },
            {
              "status": "affected",
              "version": "14.5.1-607"
            },
            {
              "status": "affected",
              "version": "14.5.3-033"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-06T16:29:37.791Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n"
        }
      ],
      "source": {
        "advisory": "cisco-sa-esa-wsa-sma-xss-zYm3f49n",
        "defects": [
          "CSCwj72814"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20504",
    "datePublished": "2024-11-06T16:29:37.791Z",
    "dateReserved": "2023-11-08T15:08:07.687Z",
    "dateUpdated": "2024-11-06T17:05:40.097Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}