alert-txt for CVE-2020-3452
Этот коммит содержится в:
родитель
e87541fe58
Коммит
0825a95bb7
@ -2,13 +2,23 @@
|
||||
|
||||
Date: 2020-07-23
|
||||
|
||||
a critical vuln exists in []
|
||||
A vulnerability in the web services interface of Cisco Adaptive Security
|
||||
Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD)
|
||||
Software could allow an unauthenticated, remote attacker to conduct
|
||||
directory traversal attacks and read sensitive files on a targeted system.
|
||||
|
||||
A POC has been release within 1 hour after the advisory.
|
||||
|
||||
Patch your Systems immediatly, since Mass-Exploitation is
|
||||
to be expected within hours.
|
||||
|
||||
|
||||
we found various IPs in your ORG/ASN,
|
||||
matching criteria for possible vulnerable systems
|
||||
|
||||
|
||||
False-Positive-Level:
|
||||
False-Positive-Level: very likely
|
||||
SNR: 30/70
|
||||
|
||||
|
||||
please find a list of affected IPs below
|
||||
@ -16,7 +26,8 @@ and more information on that problem here:
|
||||
|
||||
References:
|
||||
|
||||
- LINK
|
||||
- LINK
|
||||
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86
|
||||
- https://twitter.com/aboul3la/status/1286012324722155525
|
||||
|
||||
|
||||
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user