First published: Wed Jul 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device. This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20429 is classified as high due to the potential for remote command execution.
To fix CVE-2024-20429, apply the latest security patch provided by Cisco for AsyncOS for Secure Email Gateway.
CVE-2024-20429 affects devices running Cisco AsyncOS for Secure Email Gateway with certain configurations.
CVE-2024-20429 is a remote command execution vulnerability that can be exploited via the web-based management interface.
An attacker exploiting CVE-2024-20429 can execute arbitrary system commands on an affected Cisco AsyncOS device.