Логотип exploitDog
bind:CVE-2024-20261
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20261

Количество 3

Количество 3

nvd логотип

CVE-2024-20261

больше 1 года назад

A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-q636-jcmg-x9g2

больше 1 года назад

A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2024-04642

больше 1 года назад

Уязвимость микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), связанная с недостатками контроля доступа, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20261

A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.

CVSS3: 5.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-q636-jcmg-x9g2

A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.

CVSS3: 5.8
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-04642

Уязвимость микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), связанная с недостатками контроля доступа, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 5.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу