Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-3547

Опубликовано: 04 сент. 2020
Источник: nvd
CVSS3: 4.3
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
Версия до 13.5.1-277 (включая)
cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
Версия до 13.6.1-193 (включая)
cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
Версия до 11.7.2-011 (включая)
cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*

EPSS

Процентиль: 39%
0.00172
Низкий

4.3 Medium

CVSS3

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-200
CWE-522

Связанные уязвимости

github
больше 3 лет назад

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.

CVSS3: 4.3
fstec
больше 5 лет назад

Уязвимость веб-интерфейса управления программного обеспечения Cisco AsyncOS для систем обеспечения безопасности электронной почты Cisco Email Security Appliance, системы управления защитой контента Cisco Content Security Management Appliance, интернет-шлюзов Cisco Web Security Appliance, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 39%
0.00172
Низкий

4.3 Medium

CVSS3

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-200
CWE-522