From 0825a95bb7462dd3fa9bad4e6ac62223f897b45b Mon Sep 17 00:00:00 2001 From: Markus Manzke Date: Thu, 23 Jul 2020 17:06:07 +0200 Subject: [PATCH] alert-txt for CVE-2020-3452 --- .../alert_text.md | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-) diff --git a/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md b/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md index 560ee66..1dcfae9 100644 --- a/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md +++ b/CVE_VULN_FEED/CVE-2020-3452-cisco_asa_fileread/alert_text.md @@ -2,13 +2,23 @@ Date: 2020-07-23 -a critical vuln exists in [] +A vulnerability in the web services interface of Cisco Adaptive Security +Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) +Software could allow an unauthenticated, remote attacker to conduct +directory traversal attacks and read sensitive files on a targeted system. + +A POC has been release within 1 hour after the advisory. + +Patch your Systems immediatly, since Mass-Exploitation is +to be expected within hours. + we found various IPs in your ORG/ASN, matching criteria for possible vulnerable systems -False-Positive-Level: +False-Positive-Level: very likely +SNR: 30/70 please find a list of affected IPs below @@ -16,7 +26,8 @@ and more information on that problem here: References: -- LINK -- LINK +- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86 +- https://twitter.com/aboul3la/status/1286012324722155525 +