CVE-2024-20392

CWE-1134 documents4 sources
Severity
6.1MEDIUM
EPSS
0.3%
top 45.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 15

Description

A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow th

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

CVEListV5cisco/cisco_secure_email21 versions+20
NVDcisco/asyncos21 versions+20

🔴Vulnerability Details

2
CVEList
CVE-2024-20392: A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attack2024-05-15
GHSA
GHSA-f2q8-66wc-mcgp: A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attack2024-05-15

📋Vendor Advisories

1
Cisco
Cisco Secure Email Gateway HTTP Response Splitting Vulnerability2024-05-15