5.3

CVE-2024-20388

A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.

 This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoFirepower Management Center Version6.4.0.17
CiscoFirepower Management Center Version6.4.0.18
CiscoFirepower Management Center Version6.6.7.2
CiscoFirepower Management Center Version7.0.6.1
CiscoFirepower Management Center Version7.0.6.2
CiscoFirepower Management Center Version7.2.5.1
CiscoFirepower Management Center Version7.2.5.2
CiscoFirepower Management Center Version7.2.8.1
CiscoFirepower Management Center Version7.4.1.1
CiscoFirepower Threat Defense Version6.4.0.4
CiscoFirepower Threat Defense Version6.4.0.10
CiscoFirepower Threat Defense Version6.4.0.12
CiscoFirepower Threat Defense Version6.4.0.14
CiscoFirepower Threat Defense Version6.4.0.16
CiscoFirepower Threat Defense Version6.4.0.18
CiscoFirepower Threat Defense Version6.6.5.1
CiscoFirepower Threat Defense Version6.6.7
CiscoFirepower Threat Defense Version6.7.0.2
CiscoFirepower Threat Defense Version7.1.0.1
CiscoFirepower Threat Defense Version7.1.0.3
CiscoFirepower Threat Defense Version7.2.2
CiscoFirepower Threat Defense Version7.4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.304
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
psirt@cisco.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-202 Exposure of Sensitive Information Through Data Queries

When trying to keep information confidential, an attacker can often infer some of the information by using statistics.