9.9
CVE-2024-20329
- EPSS 0.69%
- Veröffentlicht 23.10.2024 17:15:17
- Zuletzt bearbeitet 01.08.2025 16:00:56
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version9.17.1
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.7
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.9
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.10
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.11
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.13
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.15
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.20
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.30
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.33
Cisco ≫ Adaptive Security Appliance Software Version9.18.1
Cisco ≫ Adaptive Security Appliance Software Version9.18.1.3
Cisco ≫ Adaptive Security Appliance Software Version9.18.2
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.5
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.8
Cisco ≫ Adaptive Security Appliance Software Version9.18.3
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.39
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.46
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.53
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.55
Cisco ≫ Adaptive Security Appliance Software Version9.18.3.56
Cisco ≫ Adaptive Security Appliance Software Version9.19.1
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.5
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.9
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.12
Cisco ≫ Adaptive Security Appliance Software Version9.19.1.18
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.69% | 0.708 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
psirt@cisco.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-146 Improper Neutralization of Expression/Command Delimiters
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as expression or command delimiters when they are sent to a downstream component.