Количество 4
Количество 4
CVE-2025-20184
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
GHSA-g9mx-x5c2-8c9j
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
BDU:2025-02202
Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
BDU:2025-01863
Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-20184 A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
GHSA-g9mx-x5c2-8c9j A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
BDU:2025-02202 Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
BDU:2025-01863 Уязвимость веб-интерфейса управления операционной системы Cisco AsyncOS, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу