A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
Information
Published : 2020-09-04 03:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3547
Mitre link : CVE-2020-3547
CVE.ORG link : CVE-2020-3547
JSON object : View
Products Affected
cisco
- content_security_management_appliance
- email_security_appliance
- asyncos
- web_security_appliance