6.5

CVE-2023-20114

A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoSecure Firewall Management Center Version >= 6.2.3 <= 6.2.3.18
CiscoSecure Firewall Management Center Version >= 6.4.0 <= 6.4.0.16
CiscoSecure Firewall Management Center Version >= 6.6.0 <= 6.6.7.1
CiscoSecure Firewall Management Center Version >= 7.0.0 <= 7.0.5
CiscoSecure Firewall Management Center Version >= 7.1.0 <= 7.1.0.3
CiscoSecure Firewall Management Center Version >= 7.2.0 <= 7.2.3.1
CiscoSecure Firewall Management Center Version >= 7.3.0 <= 7.3.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.34
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
psirt@cisco.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-73 External Control of File Name or Path

The product allows user input to control or influence paths or file names that are used in filesystem operations.