CVE-2023-20264Open Redirect in Cisco Adaptive Security Appliance Software

Severity
6.1MEDIUMNVD
EPSS
0.1%
top 78.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 1

Description

A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to intercept the SAML assertion of a user who is authenticating to a remote access VPN session. This vulnerability is due to insufficient validation of the login URL. An attacker could exploit this vulnerability by persu

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

🔴Vulnerability Details

2
CVEList
CVE-2023-20264: A vulnerability in the implementation of Security Assertion Markup Language (SAML) 22023-11-01
GHSA
GHSA-3gjh-276x-542v: A vulnerability in the implementation of Security Assertion Markup Language (SAML) 22023-11-01

📋Vendor Advisories

1
Cisco
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability2023-11-01
CVE-2023-20264 — Open Redirect in Cisco | cvebase