CLI Auth Priv Esc in Cisco AsyncOS Secure Web Appliance
CVE-2024-20435 Published on July 17, 2024
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
Vulnerability Analysis
CVE-2024-20435 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Execution with Unnecessary Privileges
The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Products Associated with CVE-2024-20435
Want to know whenever a new CVE is published for Cisco Asyncos? stack.watch will email you.
Affected Versions
Cisco Secure Web Appliance:- Version 11.7.0-406 is affected.
- Version 11.7.0-418 is affected.
- Version 11.7.1-049 is affected.
- Version 11.7.1-006 is affected.
- Version 11.7.1-020 is affected.
- Version 11.7.2-011 is affected.
- Version 11.8.0-414 is affected.
- Version 11.8.1-023 is affected.
- Version 11.8.3-018 is affected.
- Version 11.8.3-021 is affected.
- Version 12.0.1-268 is affected.
- Version 12.0.3-007 is affected.
- Version 12.5.2-007 is affected.
- Version 12.5.1-011 is affected.
- Version 12.5.4-005 is affected.
- Version 12.5.5-004 is affected.
- Version 12.5.6-008 is affected.
- Version 14.5.0-498 is affected.
- Version 14.5.1-016 is affected.
- Version 14.5.2-011 is affected.
- Version 14.0.3-014 is affected.
- Version 14.0.2-012 is affected.
- Version 14.0.4-005 is affected.
- Version 14.0.5-007 is affected.
- Version 15.0.0-322 is affected.
- Version 15.0.0-355 is affected.
- Version 15.1.0-287 is affected.
- Version 11.7.0-406 is affected.
- Version 11.7.0-418 is affected.
- Version 11.7.1-006 is affected.
- Version 11.7.1-020 is affected.
- Version 11.7.1-049 is affected.
- Version 11.7.2-011 is affected.
- Version 11.8.0-414 is affected.
- Version 11.8.1-023 is affected.
- Version 11.8.3-018 is affected.
- Version 11.8.3-021 is affected.
- Version 12.0.1-268 is affected.
- Version 12.0.3-007 is affected.
- Version 12.5.1-011 is affected.
- Version 12.5.2-007 is affected.
- Version 12.5.4-005 is affected.
- Version 12.5.5-004 is affected.
- Version 12.5.6-008 is affected.
- Version 14.0.2-012 is affected.
- Version 14.0.3-014 is affected.
- Version 14.0.4-005 is affected.
- Version 14.0.5-007 is affected.
- Version 14.5.0-498 is affected.
- Version 14.5.1-016 is affected.
- Version 14.5.2-011 is affected.
- Version 15.0.0-322 is affected.
- Version 15.0.0-355 is affected.
- Version 15.1.0-287 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.