Логотип exploitDog
bind:CVE-2025-20218
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20218

Количество 3

Количество 3

nvd логотип

CVE-2025-20218

около 1 месяца назад

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-wxr2-pwc5-7wgv

около 1 месяца назад

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS3: 4.9
EPSS: Низкий
fstec логотип

BDU:2025-11005

11 месяцев назад

Уязвимость программного обеспечения администрирования сети Cisco Secure Firewall Management Center (ранее Cisco Firepower Management Center), связанная с недостаточной проверкой введенных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20218

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS3: 4.9
0%
Низкий
около 1 месяца назад
github логотип
GHSA-wxr2-pwc5-7wgv

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS3: 4.9
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-11005

Уязвимость программного обеспечения администрирования сети Cisco Secure Firewall Management Center (ранее Cisco Firepower Management Center), связанная с недостаточной проверкой введенных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.9
0%
Низкий
11 месяцев назад

Уязвимостей на страницу