CVE-2024-20392

A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. 

 This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information.
HTTP Request/Response Splitting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
ciscoCNA
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
VendorProductVersion
ciscoasyncos
11.0.3-238
ciscoasyncos
11.1.0-069
ciscoasyncos
11.1.0-128
ciscoasyncos
12.0.0-419
ciscoasyncos
12.1.0-071
ciscoasyncos
12.1.0-087
ciscoasyncos
12.1.0-089
ciscoasyncos
12.5.0-066
ciscoasyncos
12.5.3-041
ciscoasyncos
12.5.4-041
ciscoasyncos
13.0.0-392
ciscoasyncos
13.0.5-007
ciscoasyncos
13.5.1-277
ciscoasyncos
13.5.4-038
ciscoasyncos
14.0.0-698
ciscoasyncos
14.2.0-620
ciscoasyncos
14.2.1-020
ciscoasyncos
14.3.0-032
ciscoasyncos
15.0.0-104
ciscoasyncos
15.0.1-030
ciscoasyncos
15.5.0-048
𝑥
= Vulnerable software versions