AI description
CVE-2020-3259 is a vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. It allows an unauthenticated, remote attacker to retrieve memory contents from an affected device, potentially leading to the disclosure of confidential information. The vulnerability stems from a buffer tracking issue during the parsing of invalid URLs requested from the web services interface. An attacker could exploit this by sending a crafted GET request to the web services interface. Successful exploitation could allow the attacker to retrieve memory contents, potentially disclosing sensitive information such as usernames and passwords. This vulnerability affects specific AnyConnect and WebVPN configurations. It has been observed being exploited in the wild, including by the Akira ransomware group.
- Description
- A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. An attacker could exploit this vulnerability by sending a crafted GET request to the web services interface. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Data from CISA
- Vulnerability name
- Cisco ASA and FTD Information Disclosure Vulnerability
- Exploit added on
- Feb 15, 2024
- Exploit action due
- Mar 7, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- psirt@cisco.com
- CWE-200
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C4B2E5D3-ED34-4A7E-BD8F-8492B6737677",
"versionEndExcluding": "6.2.3.16",
"versionStartIncluding": "6.2.3"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9D27DE97-510A-4761-8184-6940745B54E2",
"versionEndExcluding": "6.3.0.6",
"versionStartIncluding": "6.3.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06741056-2BFD-4F88-917A-F581F813B69E",
"versionEndExcluding": "6.4.0.9",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3ED0E59C-146C-494F-AD46-F6FB43F9C575",
"versionEndExcluding": "6.5.0.5",
"versionStartIncluding": "6.5.0"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CEB1AF51-43DA-4399-8264-E0A2E629F799",
"versionEndExcluding": "9.8.4.20",
"versionStartIncluding": "9.8"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2CA468F1-6A40-42FB-82D6-98AE314712A3",
"versionEndExcluding": "9.9.2.67",
"versionStartIncluding": "9.9"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8CCF1EAA-45F3-4155-B8DA-F34213C911F7",
"versionEndExcluding": "9.10.1.40",
"versionStartIncluding": "9.10"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A2380A3F-D64E-4DB2-95AB-783E83DA7E51",
"versionEndExcluding": "9.12.3.9",
"versionStartIncluding": "9.12"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "526A1138-61C7-44AD-A925-B38BDB353238",
"versionEndExcluding": "9.13.1.10",
"versionStartIncluding": "9.13"
}
],
"operator": "OR"
}
]
}
]