A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-P73ABNWQ | Patch Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-P73ABNWQ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-P73ABNWQ - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 5.3 |
Information
Published : 2020-10-21 19:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3578
Mitre link : CVE-2020-3578
CVE.ORG link : CVE-2020-3578
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
- firepower_threat_defense
CWE
CWE-863
Incorrect Authorization