9.9
CVE-2024-20329
- EPSS 0.69%
- Published 23.10.2024 17:15:17
- Last modified 01.08.2025 16:00:56
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version9.17.1
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.7
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.9
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.10
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.11
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.13
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.15
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.20
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.30
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.33
Cisco ≫ Adaptive Security Appliance Software Version9.18.1
Cisco ≫ Adaptive Security Appliance Software Version9.18.1.3
Cisco ≫ Adaptive Security Appliance Software Version9.18.2
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.5
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.8
Cisco ≫ Adaptive Security Appliance Software Version9.18.3
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.39
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.46
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.53
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.55
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.56
Cisco ≫ Adaptive Security Appliance Software Version9.19.1
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.5
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.9
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.12
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.18
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.69% | 0.708 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@cisco.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-146 Improper Neutralization of Expression/Command Delimiters
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as expression or command delimiters when they are sent to a downstream component.