6.5
CVE-2023-20114
- EPSS 0.16%
- Published 01.11.2023 17:15:11
- Last modified 26.11.2024 16:09:02
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Secure Firewall Management Center Version >= 6.2.3 <= 6.2.3.18
Cisco ≫ Secure Firewall Management Center Version >= 6.4.0 <= 6.4.0.16
Cisco ≫ Secure Firewall Management Center Version >= 6.6.0 <= 6.6.7.1
Cisco ≫ Secure Firewall Management Center Version >= 7.0.0 <= 7.0.5
Cisco ≫ Secure Firewall Management Center Version >= 7.1.0 <= 7.1.0.3
Cisco ≫ Secure Firewall Management Center Version >= 7.2.0 <= 7.2.3.1
Cisco ≫ Secure Firewall Management Center Version >= 7.3.0 <= 7.3.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.34 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
psirt@cisco.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-73 External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.