Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g9mx-x5c2-8c9j

Опубликовано: 05 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.

This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.

This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.

EPSS

Процентиль: 42%
0.00204
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-20
CWE-77

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 года назад

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.

CVSS3: 6.5
fstec
около 1 года назад

Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды

CVSS3: 6.5
fstec
около 1 года назад

Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды

EPSS

Процентиль: 42%
0.00204
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-20
CWE-77