Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3164— Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability

EPSS 0.81% · P74
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-3164

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific HTTP request headers. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to trigger a prolonged status of high CPU utilization relative to the GUI process(es). Upon successful exploitation of this vulnerability, an affected device will still be operative, but its response time and overall performance may be degraded.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Cisco产品AsyncOS输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Content Security Management Appliance(SMA)等都是美国思科(Cisco)公司的产品。Cisco Content Security Management Appliance是一套内容安全管理设备。该设备主要用于管理电子邮件和Web安全设备的所有策略、报告、审计信息等。AsyncOS Software是运行在其中的一套操作系统。Cisco Email Security Appliance是一个电子邮件安全设备。Cisco Web Security Appli
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Web Security Appliance (WSA) unspecified ~ n/a -

II. Public POCs for CVE-2020-3164

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-3164

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-03-04 · 13 CVEs total

CVE-2020-3181Cisco Email Security Appliance Uncontrolled Resource Exhaustion Vulnerability
CVE-2020-3182Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability
CVE-2020-3185Cisco TelePresence Management Suite Stored Cross-Site Scripting Vulnerability
CVE-2020-3190Cisco IOS XR Software IPsec Packet Processor Denial of Service Vulnerability
CVE-2020-3192Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability
CVE-2020-3193Cisco Prime Collaboration Provisioning Information Disclosure Vulnerability
CVE-2020-3127Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulne
CVE-2020-3128Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulne
CVE-2020-3148Cisco Prime Network Registrar Cross-Site Request Forgery Vulnerability
CVE-2020-3155Cisco Intelligent Proximity SSL Certificate Validation Vulnerability
CVE-2020-3157Cisco Identity Services Engine Cross-Site Scripting Vulnerability
CVE-2020-3176Cisco Remote PHY Device Software Command Injection Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2020-3164

No comments yet


Leave a comment