Логотип exploitDog
bind:CVE-2022-20713
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20713

Количество 3

Количество 3

nvd логотип

CVE-2022-20713

больше 3 лет назад

A vulnerability in the VPN web client services component of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device. This vulnerability is due to improper validation of input that is passed to the VPN web client services component before being returned to the browser that is in use. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious requests to a device that is running Cisco ASA Software or Cisco FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting attacks. The attacker could not directly impact the affected device.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-r8cv-8cqg-5fqv

больше 3 лет назад

A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2022-04934

больше 3 лет назад

Уязвимость компонента Clientless SSL VPN (WebVPN) микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance Software (ASA), позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20713

A vulnerability in the VPN web client services component of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device. This vulnerability is due to improper validation of input that is passed to the VPN web client services component before being returned to the browser that is in use. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious requests to a device that is running Cisco ASA Software or Cisco FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting attacks. The attacker could not directly impact the affected device.

CVSS3: 4.3
2%
Низкий
больше 3 лет назад
github логотип
GHSA-r8cv-8cqg-5fqv

A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user.

CVSS3: 6.1
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-04934

Уязвимость компонента Clientless SSL VPN (WebVPN) микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance Software (ASA), позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"

CVSS3: 4.3
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу