First published: Wed Jun 05 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | <11.6\(1\) | |
Cisco Finesse | =11.6\(1\) | |
Cisco Finesse | =11.6\(1\)-es4 | |
Cisco Finesse | =11.6\(1\)-es5 | |
Cisco Finesse | =11.6\(1\)-es6 | |
Cisco Finesse | =11.6\(1\)-es7 | |
Cisco Finesse | =11.6\(1\)-es8 | |
Cisco Finesse | =12.6\(2\) | |
Cisco Finesse | =12.6\(2\)-es01 | |
Cisco Finesse | =12.6\(2\)-es02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20404 is classified as high due to its potential for SSRF attacks.
Mitigation for CVE-2024-20404 involves applying the patches released by Cisco for the affected Finesse versions.
CVE-2024-20404 affects Cisco Finesse versions up to 11.6(1) and includes specific 12.6(2) versions.
Yes, CVE-2024-20404 can be exploited by unauthenticated remote attackers.
CVE-2024-20404 enables a server-side request forgery (SSRF) attack.