CVE-2024-20359 (GCVE-0-2024-20359)

Vulnerability from cvelistv5 – Published: 2024-04-24 18:16 – Updated: 2025-10-21 23:05
VLAI?
Summary
A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Adaptive Security Appliance (ASA) Software Affected: 9.8.1
Affected: 9.8.1.5
Affected: 9.8.1.7
Affected: 9.8.2
Affected: 9.8.2.8
Affected: 9.8.2.14
Affected: 9.8.2.15
Affected: 9.8.2.17
Affected: 9.8.2.20
Affected: 9.8.2.24
Affected: 9.8.2.26
Affected: 9.8.2.28
Affected: 9.8.2.33
Affected: 9.8.2.35
Affected: 9.8.2.38
Affected: 9.8.3.8
Affected: 9.8.3.11
Affected: 9.8.3.14
Affected: 9.8.3.16
Affected: 9.8.3.18
Affected: 9.8.3.21
Affected: 9.8.3
Affected: 9.8.3.26
Affected: 9.8.3.29
Affected: 9.8.4
Affected: 9.8.4.3
Affected: 9.8.4.7
Affected: 9.8.4.8
Affected: 9.8.4.10
Affected: 9.8.4.12
Affected: 9.8.4.15
Affected: 9.8.4.17
Affected: 9.8.4.25
Affected: 9.8.4.20
Affected: 9.8.4.22
Affected: 9.8.4.26
Affected: 9.8.4.29
Affected: 9.8.4.32
Affected: 9.8.4.33
Affected: 9.8.4.34
Affected: 9.8.4.35
Affected: 9.8.4.39
Affected: 9.8.4.40
Affected: 9.8.4.41
Affected: 9.8.4.43
Affected: 9.8.4.44
Affected: 9.8.4.45
Affected: 9.8.4.46
Affected: 9.8.4.48
Affected: 9.12.1
Affected: 9.12.1.2
Affected: 9.12.1.3
Affected: 9.12.2
Affected: 9.12.2.4
Affected: 9.12.2.5
Affected: 9.12.2.9
Affected: 9.12.3
Affected: 9.12.3.2
Affected: 9.12.3.7
Affected: 9.12.4
Affected: 9.12.3.12
Affected: 9.12.3.9
Affected: 9.12.2.1
Affected: 9.12.4.2
Affected: 9.12.4.4
Affected: 9.12.4.7
Affected: 9.12.4.10
Affected: 9.12.4.13
Affected: 9.12.4.8
Affected: 9.12.4.18
Affected: 9.12.4.24
Affected: 9.12.4.26
Affected: 9.12.4.29
Affected: 9.12.4.30
Affected: 9.12.4.35
Affected: 9.12.4.37
Affected: 9.12.4.38
Affected: 9.12.4.39
Affected: 9.12.4.40
Affected: 9.12.4.41
Affected: 9.12.4.47
Affected: 9.12.4.48
Affected: 9.12.4.50
Affected: 9.12.4.52
Affected: 9.12.4.54
Affected: 9.12.4.55
Affected: 9.12.4.56
Affected: 9.12.4.58
Affected: 9.12.4.62
Affected: 9.12.4.65
Affected: 9.14.1
Affected: 9.14.1.10
Affected: 9.14.1.6
Affected: 9.14.1.15
Affected: 9.14.1.19
Affected: 9.14.1.30
Affected: 9.14.2
Affected: 9.14.2.4
Affected: 9.14.2.8
Affected: 9.14.2.13
Affected: 9.14.2.15
Affected: 9.14.3
Affected: 9.14.3.1
Affected: 9.14.3.9
Affected: 9.14.3.11
Affected: 9.14.3.13
Affected: 9.14.3.18
Affected: 9.14.3.15
Affected: 9.14.4
Affected: 9.14.4.6
Affected: 9.14.4.7
Affected: 9.14.4.12
Affected: 9.14.4.13
Affected: 9.14.4.14
Affected: 9.14.4.15
Affected: 9.14.4.17
Affected: 9.14.4.22
Affected: 9.14.4.23
Affected: 9.15.1
Affected: 9.15.1.7
Affected: 9.15.1.10
Affected: 9.15.1.15
Affected: 9.15.1.16
Affected: 9.15.1.17
Affected: 9.15.1.1
Affected: 9.15.1.21
Affected: 9.16.1
Affected: 9.16.1.28
Affected: 9.16.2
Affected: 9.16.2.3
Affected: 9.16.2.7
Affected: 9.16.2.11
Affected: 9.16.2.13
Affected: 9.16.2.14
Affected: 9.16.3
Affected: 9.16.3.3
Affected: 9.16.3.14
Affected: 9.16.3.15
Affected: 9.16.3.19
Affected: 9.16.3.23
Affected: 9.16.4
Affected: 9.16.4.9
Affected: 9.16.4.14
Affected: 9.16.4.18
Affected: 9.16.4.19
Affected: 9.16.4.27
Affected: 9.16.4.38
Affected: 9.16.4.39
Affected: 9.16.4.42
Affected: 9.16.4.48
Affected: 9.16.4.55
Affected: 9.17.1
Affected: 9.17.1.7
Affected: 9.17.1.9
Affected: 9.17.1.10
Affected: 9.17.1.11
Affected: 9.17.1.13
Affected: 9.17.1.15
Affected: 9.17.1.20
Affected: 9.17.1.30
Affected: 9.17.1.33
Affected: 9.18.1
Affected: 9.18.1.3
Affected: 9.18.2
Affected: 9.18.2.5
Affected: 9.18.2.7
Affected: 9.18.2.8
Affected: 9.18.3
Affected: 9.18.3.39
Affected: 9.18.3.46
Affected: 9.18.3.53
Affected: 9.18.3.55
Affected: 9.18.3.56
Affected: 9.18.4
Affected: 9.18.4.5
Affected: 9.18.4.8
Affected: 9.19.1
Affected: 9.19.1.5
Affected: 9.19.1.9
Affected: 9.19.1.12
Affected: 9.19.1.18
Affected: 9.19.1.22
Affected: 9.19.1.24
Affected: 9.19.1.27
Affected: 9.20.1
Affected: 9.20.1.5
Affected: 9.20.2
Create a notification for this product.
    Cisco Cisco Firepower Threat Defense Software Affected: 6.2.3
Affected: 6.2.3.1
Affected: 6.2.3.2
Affected: 6.2.3.3
Affected: 6.2.3.4
Affected: 6.2.3.5
Affected: 6.2.3.6
Affected: 6.2.3.7
Affected: 6.2.3.8
Affected: 6.2.3.10
Affected: 6.2.3.11
Affected: 6.2.3.9
Affected: 6.2.3.12
Affected: 6.2.3.13
Affected: 6.2.3.14
Affected: 6.2.3.15
Affected: 6.2.3.16
Affected: 6.2.3.17
Affected: 6.2.3.18
Affected: 6.6.0
Affected: 6.6.0.1
Affected: 6.6.1
Affected: 6.6.3
Affected: 6.6.4
Affected: 6.6.5
Affected: 6.6.5.1
Affected: 6.6.5.2
Affected: 6.6.7
Affected: 6.6.7.1
Affected: 6.4.0
Affected: 6.4.0.1
Affected: 6.4.0.3
Affected: 6.4.0.2
Affected: 6.4.0.4
Affected: 6.4.0.5
Affected: 6.4.0.6
Affected: 6.4.0.7
Affected: 6.4.0.8
Affected: 6.4.0.9
Affected: 6.4.0.10
Affected: 6.4.0.11
Affected: 6.4.0.12
Affected: 6.4.0.13
Affected: 6.4.0.14
Affected: 6.4.0.15
Affected: 6.4.0.16
Affected: 6.4.0.17
Affected: 6.7.0
Affected: 6.7.0.1
Affected: 6.7.0.2
Affected: 6.7.0.3
Affected: 7.0.0
Affected: 7.0.0.1
Affected: 7.0.1
Affected: 7.0.1.1
Affected: 7.0.2
Affected: 7.0.2.1
Affected: 7.0.3
Affected: 7.0.4
Affected: 7.0.5
Affected: 7.0.6
Affected: 7.0.6.1
Affected: 7.1.0
Affected: 7.1.0.1
Affected: 7.1.0.2
Affected: 7.1.0.3
Affected: 7.2.0
Affected: 7.2.0.1
Affected: 7.2.1
Affected: 7.2.2
Affected: 7.2.3
Affected: 7.2.4
Affected: 7.2.4.1
Affected: 7.2.5
Affected: 7.2.5.1
Affected: 7.3.0
Affected: 7.3.1
Affected: 7.3.1.1
Affected: 7.4.0
Affected: 7.4.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.12.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.12.4.65",
                "status": "affected",
                "version": "9.12.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.14.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "9.14.4.23",
                "status": "affected",
                "version": "9.14.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.15.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.15.1.21",
                "status": "affected",
                "version": "9.15.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.16.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.16.4.55",
                "status": "affected",
                "version": "9.16.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.17.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.17.1.33",
                "status": "affected",
                "version": "9.17.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.18.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.18.4.8",
                "status": "affected",
                "version": "9.18.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.19.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.19.1.27",
                "status": "affected",
                "version": "9.19.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.20.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.20.2",
                "status": "affected",
                "version": "9.20.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.2.3.18",
                "status": "affected",
                "version": "6.2.3",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.6.7.1",
                "status": "affected",
                "version": "6.6.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.4.0.17",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.7.0.3",
                "status": "affected",
                "version": "6.7.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "7.0.6",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "7.1.0.3",
                "status": "affected",
                "version": "7.1.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "7.2.4.1",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "7.3.1.1",
                "status": "affected",
                "version": "7.3.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "firepower_threat_defense_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "7.4.1",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:asa:9.8.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asa",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "9.8.4.48",
                "status": "affected",
                "version": "9.8.1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20359",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-30T13:04:16.676593Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2024-04-24",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20359"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:05:20.462Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"
          },
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20359"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2024-04-24T00:00:00+00:00",
            "value": "CVE-2024-20359 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.379Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-asaftd-persist-rce-FLsNXF4h",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Adaptive Security Appliance (ASA) Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "9.8.1"
            },
            {
              "status": "affected",
              "version": "9.8.1.5"
            },
            {
              "status": "affected",
              "version": "9.8.1.7"
            },
            {
              "status": "affected",
              "version": "9.8.2"
            },
            {
              "status": "affected",
              "version": "9.8.2.8"
            },
            {
              "status": "affected",
              "version": "9.8.2.14"
            },
            {
              "status": "affected",
              "version": "9.8.2.15"
            },
            {
              "status": "affected",
              "version": "9.8.2.17"
            },
            {
              "status": "affected",
              "version": "9.8.2.20"
            },
            {
              "status": "affected",
              "version": "9.8.2.24"
            },
            {
              "status": "affected",
              "version": "9.8.2.26"
            },
            {
              "status": "affected",
              "version": "9.8.2.28"
            },
            {
              "status": "affected",
              "version": "9.8.2.33"
            },
            {
              "status": "affected",
              "version": "9.8.2.35"
            },
            {
              "status": "affected",
              "version": "9.8.2.38"
            },
            {
              "status": "affected",
              "version": "9.8.3.8"
            },
            {
              "status": "affected",
              "version": "9.8.3.11"
            },
            {
              "status": "affected",
              "version": "9.8.3.14"
            },
            {
              "status": "affected",
              "version": "9.8.3.16"
            },
            {
              "status": "affected",
              "version": "9.8.3.18"
            },
            {
              "status": "affected",
              "version": "9.8.3.21"
            },
            {
              "status": "affected",
              "version": "9.8.3"
            },
            {
              "status": "affected",
              "version": "9.8.3.26"
            },
            {
              "status": "affected",
              "version": "9.8.3.29"
            },
            {
              "status": "affected",
              "version": "9.8.4"
            },
            {
              "status": "affected",
              "version": "9.8.4.3"
            },
            {
              "status": "affected",
              "version": "9.8.4.7"
            },
            {
              "status": "affected",
              "version": "9.8.4.8"
            },
            {
              "status": "affected",
              "version": "9.8.4.10"
            },
            {
              "status": "affected",
              "version": "9.8.4.12"
            },
            {
              "status": "affected",
              "version": "9.8.4.15"
            },
            {
              "status": "affected",
              "version": "9.8.4.17"
            },
            {
              "status": "affected",
              "version": "9.8.4.25"
            },
            {
              "status": "affected",
              "version": "9.8.4.20"
            },
            {
              "status": "affected",
              "version": "9.8.4.22"
            },
            {
              "status": "affected",
              "version": "9.8.4.26"
            },
            {
              "status": "affected",
              "version": "9.8.4.29"
            },
            {
              "status": "affected",
              "version": "9.8.4.32"
            },
            {
              "status": "affected",
              "version": "9.8.4.33"
            },
            {
              "status": "affected",
              "version": "9.8.4.34"
            },
            {
              "status": "affected",
              "version": "9.8.4.35"
            },
            {
              "status": "affected",
              "version": "9.8.4.39"
            },
            {
              "status": "affected",
              "version": "9.8.4.40"
            },
            {
              "status": "affected",
              "version": "9.8.4.41"
            },
            {
              "status": "affected",
              "version": "9.8.4.43"
            },
            {
              "status": "affected",
              "version": "9.8.4.44"
            },
            {
              "status": "affected",
              "version": "9.8.4.45"
            },
            {
              "status": "affected",
              "version": "9.8.4.46"
            },
            {
              "status": "affected",
              "version": "9.8.4.48"
            },
            {
              "status": "affected",
              "version": "9.12.1"
            },
            {
              "status": "affected",
              "version": "9.12.1.2"
            },
            {
              "status": "affected",
              "version": "9.12.1.3"
            },
            {
              "status": "affected",
              "version": "9.12.2"
            },
            {
              "status": "affected",
              "version": "9.12.2.4"
            },
            {
              "status": "affected",
              "version": "9.12.2.5"
            },
            {
              "status": "affected",
              "version": "9.12.2.9"
            },
            {
              "status": "affected",
              "version": "9.12.3"
            },
            {
              "status": "affected",
              "version": "9.12.3.2"
            },
            {
              "status": "affected",
              "version": "9.12.3.7"
            },
            {
              "status": "affected",
              "version": "9.12.4"
            },
            {
              "status": "affected",
              "version": "9.12.3.12"
            },
            {
              "status": "affected",
              "version": "9.12.3.9"
            },
            {
              "status": "affected",
              "version": "9.12.2.1"
            },
            {
              "status": "affected",
              "version": "9.12.4.2"
            },
            {
              "status": "affected",
              "version": "9.12.4.4"
            },
            {
              "status": "affected",
              "version": "9.12.4.7"
            },
            {
              "status": "affected",
              "version": "9.12.4.10"
            },
            {
              "status": "affected",
              "version": "9.12.4.13"
            },
            {
              "status": "affected",
              "version": "9.12.4.8"
            },
            {
              "status": "affected",
              "version": "9.12.4.18"
            },
            {
              "status": "affected",
              "version": "9.12.4.24"
            },
            {
              "status": "affected",
              "version": "9.12.4.26"
            },
            {
              "status": "affected",
              "version": "9.12.4.29"
            },
            {
              "status": "affected",
              "version": "9.12.4.30"
            },
            {
              "status": "affected",
              "version": "9.12.4.35"
            },
            {
              "status": "affected",
              "version": "9.12.4.37"
            },
            {
              "status": "affected",
              "version": "9.12.4.38"
            },
            {
              "status": "affected",
              "version": "9.12.4.39"
            },
            {
              "status": "affected",
              "version": "9.12.4.40"
            },
            {
              "status": "affected",
              "version": "9.12.4.41"
            },
            {
              "status": "affected",
              "version": "9.12.4.47"
            },
            {
              "status": "affected",
              "version": "9.12.4.48"
            },
            {
              "status": "affected",
              "version": "9.12.4.50"
            },
            {
              "status": "affected",
              "version": "9.12.4.52"
            },
            {
              "status": "affected",
              "version": "9.12.4.54"
            },
            {
              "status": "affected",
              "version": "9.12.4.55"
            },
            {
              "status": "affected",
              "version": "9.12.4.56"
            },
            {
              "status": "affected",
              "version": "9.12.4.58"
            },
            {
              "status": "affected",
              "version": "9.12.4.62"
            },
            {
              "status": "affected",
              "version": "9.12.4.65"
            },
            {
              "status": "affected",
              "version": "9.14.1"
            },
            {
              "status": "affected",
              "version": "9.14.1.10"
            },
            {
              "status": "affected",
              "version": "9.14.1.6"
            },
            {
              "status": "affected",
              "version": "9.14.1.15"
            },
            {
              "status": "affected",
              "version": "9.14.1.19"
            },
            {
              "status": "affected",
              "version": "9.14.1.30"
            },
            {
              "status": "affected",
              "version": "9.14.2"
            },
            {
              "status": "affected",
              "version": "9.14.2.4"
            },
            {
              "status": "affected",
              "version": "9.14.2.8"
            },
            {
              "status": "affected",
              "version": "9.14.2.13"
            },
            {
              "status": "affected",
              "version": "9.14.2.15"
            },
            {
              "status": "affected",
              "version": "9.14.3"
            },
            {
              "status": "affected",
              "version": "9.14.3.1"
            },
            {
              "status": "affected",
              "version": "9.14.3.9"
            },
            {
              "status": "affected",
              "version": "9.14.3.11"
            },
            {
              "status": "affected",
              "version": "9.14.3.13"
            },
            {
              "status": "affected",
              "version": "9.14.3.18"
            },
            {
              "status": "affected",
              "version": "9.14.3.15"
            },
            {
              "status": "affected",
              "version": "9.14.4"
            },
            {
              "status": "affected",
              "version": "9.14.4.6"
            },
            {
              "status": "affected",
              "version": "9.14.4.7"
            },
            {
              "status": "affected",
              "version": "9.14.4.12"
            },
            {
              "status": "affected",
              "version": "9.14.4.13"
            },
            {
              "status": "affected",
              "version": "9.14.4.14"
            },
            {
              "status": "affected",
              "version": "9.14.4.15"
            },
            {
              "status": "affected",
              "version": "9.14.4.17"
            },
            {
              "status": "affected",
              "version": "9.14.4.22"
            },
            {
              "status": "affected",
              "version": "9.14.4.23"
            },
            {
              "status": "affected",
              "version": "9.15.1"
            },
            {
              "status": "affected",
              "version": "9.15.1.7"
            },
            {
              "status": "affected",
              "version": "9.15.1.10"
            },
            {
              "status": "affected",
              "version": "9.15.1.15"
            },
            {
              "status": "affected",
              "version": "9.15.1.16"
            },
            {
              "status": "affected",
              "version": "9.15.1.17"
            },
            {
              "status": "affected",
              "version": "9.15.1.1"
            },
            {
              "status": "affected",
              "version": "9.15.1.21"
            },
            {
              "status": "affected",
              "version": "9.16.1"
            },
            {
              "status": "affected",
              "version": "9.16.1.28"
            },
            {
              "status": "affected",
              "version": "9.16.2"
            },
            {
              "status": "affected",
              "version": "9.16.2.3"
            },
            {
              "status": "affected",
              "version": "9.16.2.7"
            },
            {
              "status": "affected",
              "version": "9.16.2.11"
            },
            {
              "status": "affected",
              "version": "9.16.2.13"
            },
            {
              "status": "affected",
              "version": "9.16.2.14"
            },
            {
              "status": "affected",
              "version": "9.16.3"
            },
            {
              "status": "affected",
              "version": "9.16.3.3"
            },
            {
              "status": "affected",
              "version": "9.16.3.14"
            },
            {
              "status": "affected",
              "version": "9.16.3.15"
            },
            {
              "status": "affected",
              "version": "9.16.3.19"
            },
            {
              "status": "affected",
              "version": "9.16.3.23"
            },
            {
              "status": "affected",
              "version": "9.16.4"
            },
            {
              "status": "affected",
              "version": "9.16.4.9"
            },
            {
              "status": "affected",
              "version": "9.16.4.14"
            },
            {
              "status": "affected",
              "version": "9.16.4.18"
            },
            {
              "status": "affected",
              "version": "9.16.4.19"
            },
            {
              "status": "affected",
              "version": "9.16.4.27"
            },
            {
              "status": "affected",
              "version": "9.16.4.38"
            },
            {
              "status": "affected",
              "version": "9.16.4.39"
            },
            {
              "status": "affected",
              "version": "9.16.4.42"
            },
            {
              "status": "affected",
              "version": "9.16.4.48"
            },
            {
              "status": "affected",
              "version": "9.16.4.55"
            },
            {
              "status": "affected",
              "version": "9.17.1"
            },
            {
              "status": "affected",
              "version": "9.17.1.7"
            },
            {
              "status": "affected",
              "version": "9.17.1.9"
            },
            {
              "status": "affected",
              "version": "9.17.1.10"
            },
            {
              "status": "affected",
              "version": "9.17.1.11"
            },
            {
              "status": "affected",
              "version": "9.17.1.13"
            },
            {
              "status": "affected",
              "version": "9.17.1.15"
            },
            {
              "status": "affected",
              "version": "9.17.1.20"
            },
            {
              "status": "affected",
              "version": "9.17.1.30"
            },
            {
              "status": "affected",
              "version": "9.17.1.33"
            },
            {
              "status": "affected",
              "version": "9.18.1"
            },
            {
              "status": "affected",
              "version": "9.18.1.3"
            },
            {
              "status": "affected",
              "version": "9.18.2"
            },
            {
              "status": "affected",
              "version": "9.18.2.5"
            },
            {
              "status": "affected",
              "version": "9.18.2.7"
            },
            {
              "status": "affected",
              "version": "9.18.2.8"
            },
            {
              "status": "affected",
              "version": "9.18.3"
            },
            {
              "status": "affected",
              "version": "9.18.3.39"
            },
            {
              "status": "affected",
              "version": "9.18.3.46"
            },
            {
              "status": "affected",
              "version": "9.18.3.53"
            },
            {
              "status": "affected",
              "version": "9.18.3.55"
            },
            {
              "status": "affected",
              "version": "9.18.3.56"
            },
            {
              "status": "affected",
              "version": "9.18.4"
            },
            {
              "status": "affected",
              "version": "9.18.4.5"
            },
            {
              "status": "affected",
              "version": "9.18.4.8"
            },
            {
              "status": "affected",
              "version": "9.19.1"
            },
            {
              "status": "affected",
              "version": "9.19.1.5"
            },
            {
              "status": "affected",
              "version": "9.19.1.9"
            },
            {
              "status": "affected",
              "version": "9.19.1.12"
            },
            {
              "status": "affected",
              "version": "9.19.1.18"
            },
            {
              "status": "affected",
              "version": "9.19.1.22"
            },
            {
              "status": "affected",
              "version": "9.19.1.24"
            },
            {
              "status": "affected",
              "version": "9.19.1.27"
            },
            {
              "status": "affected",
              "version": "9.20.1"
            },
            {
              "status": "affected",
              "version": "9.20.1.5"
            },
            {
              "status": "affected",
              "version": "9.20.2"
            }
          ]
        },
        {
          "product": "Cisco Firepower Threat Defense Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "6.2.3"
            },
            {
              "status": "affected",
              "version": "6.2.3.1"
            },
            {
              "status": "affected",
              "version": "6.2.3.2"
            },
            {
              "status": "affected",
              "version": "6.2.3.3"
            },
            {
              "status": "affected",
              "version": "6.2.3.4"
            },
            {
              "status": "affected",
              "version": "6.2.3.5"
            },
            {
              "status": "affected",
              "version": "6.2.3.6"
            },
            {
              "status": "affected",
              "version": "6.2.3.7"
            },
            {
              "status": "affected",
              "version": "6.2.3.8"
            },
            {
              "status": "affected",
              "version": "6.2.3.10"
            },
            {
              "status": "affected",
              "version": "6.2.3.11"
            },
            {
              "status": "affected",
              "version": "6.2.3.9"
            },
            {
              "status": "affected",
              "version": "6.2.3.12"
            },
            {
              "status": "affected",
              "version": "6.2.3.13"
            },
            {
              "status": "affected",
              "version": "6.2.3.14"
            },
            {
              "status": "affected",
              "version": "6.2.3.15"
            },
            {
              "status": "affected",
              "version": "6.2.3.16"
            },
            {
              "status": "affected",
              "version": "6.2.3.17"
            },
            {
              "status": "affected",
              "version": "6.2.3.18"
            },
            {
              "status": "affected",
              "version": "6.6.0"
            },
            {
              "status": "affected",
              "version": "6.6.0.1"
            },
            {
              "status": "affected",
              "version": "6.6.1"
            },
            {
              "status": "affected",
              "version": "6.6.3"
            },
            {
              "status": "affected",
              "version": "6.6.4"
            },
            {
              "status": "affected",
              "version": "6.6.5"
            },
            {
              "status": "affected",
              "version": "6.6.5.1"
            },
            {
              "status": "affected",
              "version": "6.6.5.2"
            },
            {
              "status": "affected",
              "version": "6.6.7"
            },
            {
              "status": "affected",
              "version": "6.6.7.1"
            },
            {
              "status": "affected",
              "version": "6.4.0"
            },
            {
              "status": "affected",
              "version": "6.4.0.1"
            },
            {
              "status": "affected",
              "version": "6.4.0.3"
            },
            {
              "status": "affected",
              "version": "6.4.0.2"
            },
            {
              "status": "affected",
              "version": "6.4.0.4"
            },
            {
              "status": "affected",
              "version": "6.4.0.5"
            },
            {
              "status": "affected",
              "version": "6.4.0.6"
            },
            {
              "status": "affected",
              "version": "6.4.0.7"
            },
            {
              "status": "affected",
              "version": "6.4.0.8"
            },
            {
              "status": "affected",
              "version": "6.4.0.9"
            },
            {
              "status": "affected",
              "version": "6.4.0.10"
            },
            {
              "status": "affected",
              "version": "6.4.0.11"
            },
            {
              "status": "affected",
              "version": "6.4.0.12"
            },
            {
              "status": "affected",
              "version": "6.4.0.13"
            },
            {
              "status": "affected",
              "version": "6.4.0.14"
            },
            {
              "status": "affected",
              "version": "6.4.0.15"
            },
            {
              "status": "affected",
              "version": "6.4.0.16"
            },
            {
              "status": "affected",
              "version": "6.4.0.17"
            },
            {
              "status": "affected",
              "version": "6.7.0"
            },
            {
              "status": "affected",
              "version": "6.7.0.1"
            },
            {
              "status": "affected",
              "version": "6.7.0.2"
            },
            {
              "status": "affected",
              "version": "6.7.0.3"
            },
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.0.1"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.0.1.1"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.0.2.1"
            },
            {
              "status": "affected",
              "version": "7.0.3"
            },
            {
              "status": "affected",
              "version": "7.0.4"
            },
            {
              "status": "affected",
              "version": "7.0.5"
            },
            {
              "status": "affected",
              "version": "7.0.6"
            },
            {
              "status": "affected",
              "version": "7.0.6.1"
            },
            {
              "status": "affected",
              "version": "7.1.0"
            },
            {
              "status": "affected",
              "version": "7.1.0.1"
            },
            {
              "status": "affected",
              "version": "7.1.0.2"
            },
            {
              "status": "affected",
              "version": "7.1.0.3"
            },
            {
              "status": "affected",
              "version": "7.2.0"
            },
            {
              "status": "affected",
              "version": "7.2.0.1"
            },
            {
              "status": "affected",
              "version": "7.2.1"
            },
            {
              "status": "affected",
              "version": "7.2.2"
            },
            {
              "status": "affected",
              "version": "7.2.3"
            },
            {
              "status": "affected",
              "version": "7.2.4"
            },
            {
              "status": "affected",
              "version": "7.2.4.1"
            },
            {
              "status": "affected",
              "version": "7.2.5"
            },
            {
              "status": "affected",
              "version": "7.2.5.1"
            },
            {
              "status": "affected",
              "version": "7.3.0"
            },
            {
              "status": "affected",
              "version": "7.3.1"
            },
            {
              "status": "affected",
              "version": "7.3.1.1"
            },
            {
              "status": "affected",
              "version": "7.4.0"
            },
            {
              "status": "affected",
              "version": "7.4.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-24T18:16:49.769Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-asaftd-persist-rce-FLsNXF4h",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h"
        }
      ],
      "source": {
        "advisory": "cisco-sa-asaftd-persist-rce-FLsNXF4h",
        "defects": [
          "CSCwi98284"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20359",
    "datePublished": "2024-04-24T18:16:49.769Z",
    "dateReserved": "2023-11-08T15:08:07.650Z",
    "dateUpdated": "2025-10-21T23:05:20.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2024-20359",
      "cwes": "[\"CWE-94\"]",
      "dateAdded": "2024-04-24",
      "dueDate": "2024-05-01",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h;  https://nvd.nist.gov/vuln/detail/CVE-2024-20359",
      "product": "Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)",
      "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "shortDescription": "Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.",
      "vendorProject": "Cisco",
      "vulnerabilityName": "Cisco ASA and FTD Privilege Escalation Vulnerability"
    },
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-04-24T18:16:49.769Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\\r\\n\\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\"}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"version\": \"9.8.1\", \"status\": \"affected\"}, {\"version\": \"9.8.1.5\", \"status\": \"affected\"}, {\"version\": \"9.8.1.7\", \"status\": \"affected\"}, {\"version\": \"9.8.2\", \"status\": \"affected\"}, {\"version\": \"9.8.2.8\", \"status\": \"affected\"}, {\"version\": \"9.8.2.14\", \"status\": \"affected\"}, {\"version\": \"9.8.2.15\", \"status\": \"affected\"}, {\"version\": \"9.8.2.17\", \"status\": \"affected\"}, {\"version\": \"9.8.2.20\", \"status\": \"affected\"}, {\"version\": \"9.8.2.24\", \"status\": \"affected\"}, {\"version\": \"9.8.2.26\", \"status\": \"affected\"}, {\"version\": \"9.8.2.28\", \"status\": \"affected\"}, {\"version\": \"9.8.2.33\", \"status\": \"affected\"}, {\"version\": \"9.8.2.35\", \"status\": \"affected\"}, {\"version\": \"9.8.2.38\", \"status\": \"affected\"}, {\"version\": \"9.8.3.8\", \"status\": \"affected\"}, {\"version\": \"9.8.3.11\", \"status\": \"affected\"}, {\"version\": \"9.8.3.14\", \"status\": \"affected\"}, {\"version\": \"9.8.3.16\", \"status\": \"affected\"}, {\"version\": \"9.8.3.18\", \"status\": \"affected\"}, {\"version\": \"9.8.3.21\", \"status\": \"affected\"}, {\"version\": \"9.8.3\", \"status\": \"affected\"}, {\"version\": \"9.8.3.26\", \"status\": \"affected\"}, {\"version\": \"9.8.3.29\", \"status\": \"affected\"}, {\"version\": \"9.8.4\", \"status\": \"affected\"}, {\"version\": \"9.8.4.3\", \"status\": \"affected\"}, {\"version\": \"9.8.4.7\", \"status\": \"affected\"}, {\"version\": \"9.8.4.8\", \"status\": \"affected\"}, {\"version\": \"9.8.4.10\", \"status\": \"affected\"}, {\"version\": \"9.8.4.12\", \"status\": \"affected\"}, {\"version\": \"9.8.4.15\", \"status\": \"affected\"}, {\"version\": \"9.8.4.17\", \"status\": \"affected\"}, {\"version\": \"9.8.4.25\", \"status\": \"affected\"}, {\"version\": \"9.8.4.20\", \"status\": \"affected\"}, {\"version\": \"9.8.4.22\", \"status\": \"affected\"}, {\"version\": \"9.8.4.26\", \"status\": \"affected\"}, {\"version\": \"9.8.4.29\", \"status\": \"affected\"}, {\"version\": \"9.8.4.32\", \"status\": \"affected\"}, {\"version\": \"9.8.4.33\", \"status\": \"affected\"}, {\"version\": \"9.8.4.34\", \"status\": \"affected\"}, {\"version\": \"9.8.4.35\", \"status\": \"affected\"}, {\"version\": \"9.8.4.39\", \"status\": \"affected\"}, {\"version\": \"9.8.4.40\", \"status\": \"affected\"}, {\"version\": \"9.8.4.41\", \"status\": \"affected\"}, {\"version\": \"9.8.4.43\", \"status\": \"affected\"}, {\"version\": \"9.8.4.44\", \"status\": \"affected\"}, {\"version\": \"9.8.4.45\", \"status\": \"affected\"}, {\"version\": \"9.8.4.46\", \"status\": \"affected\"}, {\"version\": \"9.8.4.48\", \"status\": \"affected\"}, {\"version\": \"9.12.1\", \"status\": \"affected\"}, {\"version\": \"9.12.1.2\", \"status\": \"affected\"}, {\"version\": \"9.12.1.3\", \"status\": \"affected\"}, {\"version\": \"9.12.2\", \"status\": \"affected\"}, {\"version\": \"9.12.2.4\", \"status\": \"affected\"}, {\"version\": \"9.12.2.5\", \"status\": \"affected\"}, {\"version\": \"9.12.2.9\", \"status\": \"affected\"}, {\"version\": \"9.12.3\", \"status\": \"affected\"}, {\"version\": \"9.12.3.2\", \"status\": \"affected\"}, {\"version\": \"9.12.3.7\", \"status\": \"affected\"}, {\"version\": \"9.12.4\", \"status\": \"affected\"}, {\"version\": \"9.12.3.12\", \"status\": \"affected\"}, {\"version\": \"9.12.3.9\", \"status\": \"affected\"}, {\"version\": \"9.12.2.1\", \"status\": \"affected\"}, {\"version\": \"9.12.4.2\", \"status\": \"affected\"}, {\"version\": \"9.12.4.4\", \"status\": \"affected\"}, {\"version\": \"9.12.4.7\", \"status\": \"affected\"}, {\"version\": \"9.12.4.10\", \"status\": \"affected\"}, {\"version\": \"9.12.4.13\", \"status\": \"affected\"}, {\"version\": \"9.12.4.8\", \"status\": \"affected\"}, {\"version\": \"9.12.4.18\", \"status\": \"affected\"}, {\"version\": \"9.12.4.24\", \"status\": \"affected\"}, {\"version\": \"9.12.4.26\", \"status\": \"affected\"}, {\"version\": \"9.12.4.29\", \"status\": \"affected\"}, {\"version\": \"9.12.4.30\", \"status\": \"affected\"}, {\"version\": \"9.12.4.35\", \"status\": \"affected\"}, {\"version\": \"9.12.4.37\", \"status\": \"affected\"}, {\"version\": \"9.12.4.38\", \"status\": \"affected\"}, {\"version\": \"9.12.4.39\", \"status\": \"affected\"}, {\"version\": \"9.12.4.40\", \"status\": \"affected\"}, {\"version\": \"9.12.4.41\", \"status\": \"affected\"}, {\"version\": \"9.12.4.47\", \"status\": \"affected\"}, {\"version\": \"9.12.4.48\", \"status\": \"affected\"}, {\"version\": \"9.12.4.50\", \"status\": \"affected\"}, {\"version\": \"9.12.4.52\", \"status\": \"affected\"}, {\"version\": \"9.12.4.54\", \"status\": \"affected\"}, {\"version\": \"9.12.4.55\", \"status\": \"affected\"}, {\"version\": \"9.12.4.56\", \"status\": \"affected\"}, {\"version\": \"9.12.4.58\", \"status\": \"affected\"}, {\"version\": \"9.12.4.62\", \"status\": \"affected\"}, {\"version\": \"9.12.4.65\", \"status\": \"affected\"}, {\"version\": \"9.14.1\", \"status\": \"affected\"}, {\"version\": \"9.14.1.10\", \"status\": \"affected\"}, {\"version\": \"9.14.1.6\", \"status\": \"affected\"}, {\"version\": \"9.14.1.15\", \"status\": \"affected\"}, {\"version\": \"9.14.1.19\", \"status\": \"affected\"}, {\"version\": \"9.14.1.30\", \"status\": \"affected\"}, {\"version\": \"9.14.2\", \"status\": \"affected\"}, {\"version\": \"9.14.2.4\", \"status\": \"affected\"}, {\"version\": \"9.14.2.8\", \"status\": \"affected\"}, {\"version\": \"9.14.2.13\", \"status\": \"affected\"}, {\"version\": \"9.14.2.15\", \"status\": \"affected\"}, {\"version\": \"9.14.3\", \"status\": \"affected\"}, {\"version\": \"9.14.3.1\", \"status\": \"affected\"}, {\"version\": \"9.14.3.9\", \"status\": \"affected\"}, {\"version\": \"9.14.3.11\", \"status\": \"affected\"}, {\"version\": \"9.14.3.13\", \"status\": \"affected\"}, {\"version\": \"9.14.3.18\", \"status\": \"affected\"}, {\"version\": \"9.14.3.15\", \"status\": \"affected\"}, {\"version\": \"9.14.4\", \"status\": \"affected\"}, {\"version\": \"9.14.4.6\", \"status\": \"affected\"}, {\"version\": \"9.14.4.7\", \"status\": \"affected\"}, {\"version\": \"9.14.4.12\", \"status\": \"affected\"}, {\"version\": \"9.14.4.13\", \"status\": \"affected\"}, {\"version\": \"9.14.4.14\", \"status\": \"affected\"}, {\"version\": \"9.14.4.15\", \"status\": \"affected\"}, {\"version\": \"9.14.4.17\", \"status\": \"affected\"}, {\"version\": \"9.14.4.22\", \"status\": \"affected\"}, {\"version\": \"9.14.4.23\", \"status\": \"affected\"}, {\"version\": \"9.15.1\", \"status\": \"affected\"}, {\"version\": \"9.15.1.7\", \"status\": \"affected\"}, {\"version\": \"9.15.1.10\", \"status\": \"affected\"}, {\"version\": \"9.15.1.15\", \"status\": \"affected\"}, {\"version\": \"9.15.1.16\", \"status\": \"affected\"}, {\"version\": \"9.15.1.17\", \"status\": \"affected\"}, {\"version\": \"9.15.1.1\", \"status\": \"affected\"}, {\"version\": \"9.15.1.21\", \"status\": \"affected\"}, {\"version\": \"9.16.1\", \"status\": \"affected\"}, {\"version\": \"9.16.1.28\", \"status\": \"affected\"}, {\"version\": \"9.16.2\", \"status\": \"affected\"}, {\"version\": \"9.16.2.3\", \"status\": \"affected\"}, {\"version\": \"9.16.2.7\", \"status\": \"affected\"}, {\"version\": \"9.16.2.11\", \"status\": \"affected\"}, {\"version\": \"9.16.2.13\", \"status\": \"affected\"}, {\"version\": \"9.16.2.14\", \"status\": \"affected\"}, {\"version\": \"9.16.3\", \"status\": \"affected\"}, {\"version\": \"9.16.3.3\", \"status\": \"affected\"}, {\"version\": \"9.16.3.14\", \"status\": \"affected\"}, {\"version\": \"9.16.3.15\", \"status\": \"affected\"}, {\"version\": \"9.16.3.19\", \"status\": \"affected\"}, {\"version\": \"9.16.3.23\", \"status\": \"affected\"}, {\"version\": \"9.16.4\", \"status\": \"affected\"}, {\"version\": \"9.16.4.9\", \"status\": \"affected\"}, {\"version\": \"9.16.4.14\", \"status\": \"affected\"}, {\"version\": \"9.16.4.18\", \"status\": \"affected\"}, {\"version\": \"9.16.4.19\", \"status\": \"affected\"}, {\"version\": \"9.16.4.27\", \"status\": \"affected\"}, {\"version\": \"9.16.4.38\", \"status\": \"affected\"}, {\"version\": \"9.16.4.39\", \"status\": \"affected\"}, {\"version\": \"9.16.4.42\", \"status\": \"affected\"}, {\"version\": \"9.16.4.48\", \"status\": \"affected\"}, {\"version\": \"9.16.4.55\", \"status\": \"affected\"}, {\"version\": \"9.17.1\", \"status\": \"affected\"}, {\"version\": \"9.17.1.7\", \"status\": \"affected\"}, {\"version\": \"9.17.1.9\", \"status\": \"affected\"}, {\"version\": \"9.17.1.10\", \"status\": \"affected\"}, {\"version\": \"9.17.1.11\", \"status\": \"affected\"}, {\"version\": \"9.17.1.13\", \"status\": \"affected\"}, {\"version\": \"9.17.1.15\", \"status\": \"affected\"}, {\"version\": \"9.17.1.20\", \"status\": \"affected\"}, {\"version\": \"9.17.1.30\", \"status\": \"affected\"}, {\"version\": \"9.17.1.33\", \"status\": \"affected\"}, {\"version\": \"9.18.1\", \"status\": \"affected\"}, {\"version\": \"9.18.1.3\", \"status\": \"affected\"}, {\"version\": \"9.18.2\", \"status\": \"affected\"}, {\"version\": \"9.18.2.5\", \"status\": \"affected\"}, {\"version\": \"9.18.2.7\", \"status\": \"affected\"}, {\"version\": \"9.18.2.8\", \"status\": \"affected\"}, {\"version\": \"9.18.3\", \"status\": \"affected\"}, {\"version\": \"9.18.3.39\", \"status\": \"affected\"}, {\"version\": \"9.18.3.46\", \"status\": \"affected\"}, {\"version\": \"9.18.3.53\", \"status\": \"affected\"}, {\"version\": \"9.18.3.55\", \"status\": \"affected\"}, {\"version\": \"9.18.3.56\", \"status\": \"affected\"}, {\"version\": \"9.18.4\", \"status\": \"affected\"}, {\"version\": \"9.18.4.5\", \"status\": \"affected\"}, {\"version\": \"9.18.4.8\", \"status\": \"affected\"}, {\"version\": \"9.19.1\", \"status\": \"affected\"}, {\"version\": \"9.19.1.5\", \"status\": \"affected\"}, {\"version\": \"9.19.1.9\", \"status\": \"affected\"}, {\"version\": \"9.19.1.12\", \"status\": \"affected\"}, {\"version\": \"9.19.1.18\", \"status\": \"affected\"}, {\"version\": \"9.19.1.22\", \"status\": \"affected\"}, {\"version\": \"9.19.1.24\", \"status\": \"affected\"}, {\"version\": \"9.19.1.27\", \"status\": \"affected\"}, {\"version\": \"9.20.1\", \"status\": \"affected\"}, {\"version\": \"9.20.1.5\", \"status\": \"affected\"}, {\"version\": \"9.20.2\", \"status\": \"affected\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Threat Defense Software\", \"versions\": [{\"version\": \"6.2.3\", \"status\": \"affected\"}, {\"version\": \"6.2.3.1\", \"status\": \"affected\"}, {\"version\": \"6.2.3.2\", \"status\": \"affected\"}, {\"version\": \"6.2.3.3\", \"status\": \"affected\"}, {\"version\": \"6.2.3.4\", \"status\": \"affected\"}, {\"version\": \"6.2.3.5\", \"status\": \"affected\"}, {\"version\": \"6.2.3.6\", \"status\": \"affected\"}, {\"version\": \"6.2.3.7\", \"status\": \"affected\"}, {\"version\": \"6.2.3.8\", \"status\": \"affected\"}, {\"version\": \"6.2.3.10\", \"status\": \"affected\"}, {\"version\": \"6.2.3.11\", \"status\": \"affected\"}, {\"version\": \"6.2.3.9\", \"status\": \"affected\"}, {\"version\": \"6.2.3.12\", \"status\": \"affected\"}, {\"version\": \"6.2.3.13\", \"status\": \"affected\"}, {\"version\": \"6.2.3.14\", \"status\": \"affected\"}, {\"version\": \"6.2.3.15\", \"status\": \"affected\"}, {\"version\": \"6.2.3.16\", \"status\": \"affected\"}, {\"version\": \"6.2.3.17\", \"status\": \"affected\"}, {\"version\": \"6.2.3.18\", \"status\": \"affected\"}, {\"version\": \"6.6.0\", \"status\": \"affected\"}, {\"version\": \"6.6.0.1\", \"status\": \"affected\"}, {\"version\": \"6.6.1\", \"status\": \"affected\"}, {\"version\": \"6.6.3\", \"status\": \"affected\"}, {\"version\": \"6.6.4\", \"status\": \"affected\"}, {\"version\": \"6.6.5\", \"status\": \"affected\"}, {\"version\": \"6.6.5.1\", \"status\": \"affected\"}, {\"version\": \"6.6.5.2\", \"status\": \"affected\"}, {\"version\": \"6.6.7\", \"status\": \"affected\"}, {\"version\": \"6.6.7.1\", \"status\": \"affected\"}, {\"version\": \"6.4.0\", \"status\": \"affected\"}, {\"version\": \"6.4.0.1\", \"status\": \"affected\"}, {\"version\": \"6.4.0.3\", \"status\": \"affected\"}, {\"version\": \"6.4.0.2\", \"status\": \"affected\"}, {\"version\": \"6.4.0.4\", \"status\": \"affected\"}, {\"version\": \"6.4.0.5\", \"status\": \"affected\"}, {\"version\": \"6.4.0.6\", \"status\": \"affected\"}, {\"version\": \"6.4.0.7\", \"status\": \"affected\"}, {\"version\": \"6.4.0.8\", \"status\": \"affected\"}, {\"version\": \"6.4.0.9\", \"status\": \"affected\"}, {\"version\": \"6.4.0.10\", \"status\": \"affected\"}, {\"version\": \"6.4.0.11\", \"status\": \"affected\"}, {\"version\": \"6.4.0.12\", \"status\": \"affected\"}, {\"version\": \"6.4.0.13\", \"status\": \"affected\"}, {\"version\": \"6.4.0.14\", \"status\": \"affected\"}, {\"version\": \"6.4.0.15\", \"status\": \"affected\"}, {\"version\": \"6.4.0.16\", \"status\": \"affected\"}, {\"version\": \"6.4.0.17\", \"status\": \"affected\"}, {\"version\": \"6.7.0\", \"status\": \"affected\"}, {\"version\": \"6.7.0.1\", \"status\": \"affected\"}, {\"version\": \"6.7.0.2\", \"status\": \"affected\"}, {\"version\": \"6.7.0.3\", \"status\": \"affected\"}, {\"version\": \"7.0.0\", \"status\": \"affected\"}, {\"version\": \"7.0.0.1\", \"status\": \"affected\"}, {\"version\": \"7.0.1\", \"status\": \"affected\"}, {\"version\": \"7.0.1.1\", \"status\": \"affected\"}, {\"version\": \"7.0.2\", \"status\": \"affected\"}, {\"version\": \"7.0.2.1\", \"status\": \"affected\"}, {\"version\": \"7.0.3\", \"status\": \"affected\"}, {\"version\": \"7.0.4\", \"status\": \"affected\"}, {\"version\": \"7.0.5\", \"status\": \"affected\"}, {\"version\": \"7.0.6\", \"status\": \"affected\"}, {\"version\": \"7.0.6.1\", \"status\": \"affected\"}, {\"version\": \"7.1.0\", \"status\": \"affected\"}, {\"version\": \"7.1.0.1\", \"status\": \"affected\"}, {\"version\": \"7.1.0.2\", \"status\": \"affected\"}, {\"version\": \"7.1.0.3\", \"status\": \"affected\"}, {\"version\": \"7.2.0\", \"status\": \"affected\"}, {\"version\": \"7.2.0.1\", \"status\": \"affected\"}, {\"version\": \"7.2.1\", \"status\": \"affected\"}, {\"version\": \"7.2.2\", \"status\": \"affected\"}, {\"version\": \"7.2.3\", \"status\": \"affected\"}, {\"version\": \"7.2.4\", \"status\": \"affected\"}, {\"version\": \"7.2.4.1\", \"status\": \"affected\"}, {\"version\": \"7.2.5\", \"status\": \"affected\"}, {\"version\": \"7.2.5.1\", \"status\": \"affected\"}, {\"version\": \"7.3.0\", \"status\": \"affected\"}, {\"version\": \"7.3.1\", \"status\": \"affected\"}, {\"version\": \"7.3.1.1\", \"status\": \"affected\"}, {\"version\": \"7.4.0\", \"status\": \"affected\"}, {\"version\": \"7.4.1\", \"status\": \"affected\"}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Improper Control of Generation of Code (\u0027Code Injection\u0027)\", \"type\": \"cwe\", \"cweId\": \"CWE-94\"}]}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h\", \"name\": \"cisco-sa-asaftd-persist-rce-FLsNXF4h\"}], \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.\"}], \"source\": {\"advisory\": \"cisco-sa-asaftd-persist-rce-FLsNXF4h\", \"discovery\": \"EXTERNAL\", \"defects\": [\"CSCwi98284\"]}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:42.379Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h\", \"name\": \"cisco-sa-asaftd-persist-rce-FLsNXF4h\", \"tags\": [\"x_transferred\"]}]}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20359\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-30T13:04:16.676593Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2024-04-24\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20359\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:asa:9.12.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.12.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.12.4.65\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.14.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.14.1\", \"lessThan\": \"9.14.4.23\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.15.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.15.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.15.1.21\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.16.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.16.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.16.4.55\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.17.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.17.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.17.1.33\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.18.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.18.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.18.4.8\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.19.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.19.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.19.1.27\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.20.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.20.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.20.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.3\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2.3.18\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.6.7.1\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.4.0.17\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.7.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.7.0.3\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.0.6\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.1.0.3\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.2.4.1\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.3.1.1\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"firepower_threat_defense_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.4.1\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:asa:9.8.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asa\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.8.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.8.4.48\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-30T13:09:46.237Z\"}, \"timeline\": [{\"time\": \"2024-04-24T00:00:00+00:00\", \"lang\": \"en\", \"value\": \"CVE-2024-20359 added to CISA KEV\"}], \"title\": \"CISA ADP Vulnrichment\"}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-20359\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2023-11-08T15:08:07.650Z\", \"datePublished\": \"2024-04-24T18:16:49.769Z\", \"dateUpdated\": \"2025-07-28T19:43:21.846Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…