Lucene search

K
cve[email protected]CVE-2020-3458
HistoryOct 21, 2020 - 7:15 p.m.

CVE-2020-3458

2020-10-2119:15:16
CWE-693
web.nvd.nist.gov
50
cisco
adaptive security appliance
asa software
firepower threat defense
ftd software
firepower 1000 series
firepower 2100 series
vulnerabilities
secure boot
local attacker
bypass
code injection
device boot process
chain of trust
persistence.

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_softwareRange9.8.09.8.4.26
OR
ciscoadaptive_security_appliance_softwareRange9.9.09.9.2.80
OR
ciscoadaptive_security_appliance_softwareRange9.10.09.10.1.43
OR
ciscoadaptive_security_appliance_softwareRange9.12.09.12.4.3
OR
ciscoadaptive_security_appliance_softwareRange9.13.09.13.1.13
OR
ciscoadaptive_security_appliance_softwareRange9.14.09.14.1.15
AND
ciscofirepower_1010
OR
ciscofirepower_1010Match-
OR
ciscofirepower_1120Match-
OR
ciscofirepower_1140Match-
OR
ciscofirepower_1150Match-
OR
ciscofirepower_2110Match-
OR
ciscofirepower_2120Match-
OR
ciscofirepower_2130Match-
OR
ciscofirepower_2140Match-
Node
ciscofirepower_threat_defenseRange6.2.2
OR
ciscofirepower_threat_defenseRange6.3.06.3.0.6
OR
ciscofirepower_threat_defenseRange6.4.06.4.0.10
OR
ciscofirepower_threat_defenseRange6.5.06.5.0.5
OR
ciscofirepower_threat_defenseMatch6.6.0
AND
ciscofirepower_1010Match-
OR
ciscofirepower_1120Match-
OR
ciscofirepower_1140Match-
OR
ciscofirepower_1150Match-
OR
ciscofirepower_2110Match-
OR
ciscofirepower_2120Match-
OR
ciscofirepower_2130Match-
OR
ciscofirepower_2140Match-

CNA Affected

[
  {
    "product": "Cisco Adaptive Security Appliance (ASA) Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2020-3458