vendor:
Cisco ASA and FTD
by:
3ndG4me
7.5
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Cisco ASA and FTD
Affected Version From: 9.6.4.42
Affected Version To: 9.6.4.42
Patch Exists: YES
Related CWE: CVE-2020-3452
CPE: a:cisco:asa:9.6.4.42
Tags: lfi,kev,packetstorm,cve,cve2020,cisco
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei References:
https://twitter.com/aboul3la/status/1286012324722155525, http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html, http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html, http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html, http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html, https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86, https://nvd.nist.gov/vuln/detail/CVE-2020-3452
Nuclei Metadata: {'max-request': 2, 'vendor': 'cisco', 'product': 'adaptive_security_appliance'}
Platforms Tested:
2020
Cisco ASA and FTD 9.6.4.42 – Path Traversal
This exploit allows an attacker to bypass the security restrictions and access files on the Cisco ASA and FTD 9.6.4.42 devices. By sending a specially crafted request to the target, the attacker can traverse directories and retrieve sensitive information.
Mitigation:
Cisco has released a patch for this vulnerability. It is recommended to update to the latest version of Cisco ASA and FTD to mitigate this issue.