ID

VAR-202010-1044


CVE

CVE-2020-3561


TITLE

Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software injection vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-009724

DESCRIPTION

A vulnerability in the Clientless SSL VPN (WebVPN) of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to inject arbitrary HTTP headers in the responses of the affected system. The vulnerability is due to improper input sanitization. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to conduct a CRLF injection attack, adding arbitrary HTTP headers in the responses of the system and redirecting the user to arbitrary websites. The platform provides features such as highly secure access to data and network resources. Successful exploitation of this vulnerability allows attackers to exploit this vulnerability to perform CRLF injection attacks

Trust: 1.8

sources: NVD: CVE-2020-3561 // JVNDB: JVNDB-2020-009724 // VULHUB: VHN-181686 // VULMON: CVE-2020-3561

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.9.2.80

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.14.1.10

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.4.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.8.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.6.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.8.4.20

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.5.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.4.0.10

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.12.3.9

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.10.1.43

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:ltversion:9.6.4.35

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.5.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.12.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.3.0.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.10.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.13.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.13.1.10

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.6.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.14.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.9.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower threat defense softwarescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009724 // NVD: CVE-2020-3561

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3561
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3561
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009724
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202010-1166
value: MEDIUM

Trust: 0.6

VULHUB: VHN-181686
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-3561
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3561
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-009724
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181686
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3561
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3561
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-009724
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181686 // VULMON: CVE-2020-3561 // JVNDB: JVNDB-2020-009724 // CNNVD: CNNVD-202010-1166 // NVD: CVE-2020-3561 // NVD: CVE-2020-3561

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.9

problemtype:CWE-93

Trust: 1.0

sources: VULHUB: VHN-181686 // JVNDB: JVNDB-2020-009724 // NVD: CVE-2020-3561

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-1166

TYPE

injection

Trust: 0.6

sources: CNNVD: CNNVD-202010-1166

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009724

PATCH

title:cisco-sa-asa-ftd-crlf-inj-BX9uRwSnurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-crlf-inj-BX9uRwSn

Trust: 0.8

sources: JVNDB: JVNDB-2020-009724

EXTERNAL IDS

db:NVDid:CVE-2020-3561

Trust: 2.6

db:JVNDBid:JVNDB-2020-009724

Trust: 0.8

db:CNNVDid:CNNVD-202010-1166

Trust: 0.7

db:AUSCERTid:ESB-2020.3642.3

Trust: 0.6

db:AUSCERTid:ESB-2020.3642

Trust: 0.6

db:NSFOCUSid:50186

Trust: 0.6

db:VULHUBid:VHN-181686

Trust: 0.1

db:VULMONid:CVE-2020-3561

Trust: 0.1

sources: VULHUB: VHN-181686 // VULMON: CVE-2020-3561 // JVNDB: JVNDB-2020-009724 // CNNVD: CNNVD-202010-1166 // NVD: CVE-2020-3561

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-asa-ftd-crlf-inj-bx9urwsn

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-3561

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3561

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.3642.3

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-asa-software-read-write-access-via-webvpn-http-headers-injection-33663

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3642/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50186

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/74.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-181686 // VULMON: CVE-2020-3561 // JVNDB: JVNDB-2020-009724 // CNNVD: CNNVD-202010-1166 // NVD: CVE-2020-3561

SOURCES

db:VULHUBid:VHN-181686
db:VULMONid:CVE-2020-3561
db:JVNDBid:JVNDB-2020-009724
db:CNNVDid:CNNVD-202010-1166
db:NVDid:CVE-2020-3561

LAST UPDATE DATE

2024-08-14T13:54:28.553000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181686date:2020-10-30T00:00:00
db:VULMONid:CVE-2020-3561date:2020-10-30T00:00:00
db:JVNDBid:JVNDB-2020-009724date:2020-12-02T07:28:38
db:CNNVDid:CNNVD-202010-1166date:2021-06-30T00:00:00
db:NVDid:CVE-2020-3561date:2023-08-16T16:17:07.960

SOURCES RELEASE DATE

db:VULHUBid:VHN-181686date:2020-10-21T00:00:00
db:VULMONid:CVE-2020-3561date:2020-10-21T00:00:00
db:JVNDBid:JVNDB-2020-009724date:2020-12-02T07:28:38
db:CNNVDid:CNNVD-202010-1166date:2020-10-21T00:00:00
db:NVDid:CVE-2020-3561date:2020-10-21T19:15:17.793