diff --git a/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md b/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md index 560ee66..1dcfae9 100644 --- a/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md +++ b/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md @@ -2,13 +2,23 @@ Date: 2020-07-23 -a critical vuln exists in [] +A vulnerability in the web services interface of Cisco Adaptive Security +Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) +Software could allow an unauthenticated, remote attacker to conduct +directory traversal attacks and read sensitive files on a targeted system. + +A POC has been release within 1 hour after the advisory. + +Patch your Systems immediatly, since Mass-Exploitation is +to be expected within hours. + we found various IPs in your ORG/ASN, matching criteria for possible vulnerable systems -False-Positive-Level: +False-Positive-Level: very likely +SNR: 30/70 please find a list of affected IPs below @@ -16,7 +26,8 @@ and more information on that problem here: References: -- LINK -- LINK +- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86 +- https://twitter.com/aboul3la/status/1286012324722155525 +