6.5

CVE-2023-20114

A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.

Data is provided by the National Vulnerability Database (NVD)
CiscoSecure Firewall Management Center Version >= 6.2.3 <= 6.2.3.18
CiscoSecure Firewall Management Center Version >= 6.4.0 <= 6.4.0.16
CiscoSecure Firewall Management Center Version >= 6.6.0 <= 6.6.7.1
CiscoSecure Firewall Management Center Version >= 7.0.0 <= 7.0.5
CiscoSecure Firewall Management Center Version >= 7.1.0 <= 7.1.0.3
CiscoSecure Firewall Management Center Version >= 7.2.0 <= 7.2.3.1
CiscoSecure Firewall Management Center Version >= 7.3.0 <= 7.3.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.34
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
psirt@cisco.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-73 External Control of File Name or Path

The product allows user input to control or influence paths or file names that are used in filesystem operations.