A vulnerability in the CLI of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to excessive verbosity in certain log subscriptions. An attacker could exploit this vulnerability by accessing specific log files on an affected device. A successful exploit could allow the attacker to obtain sensitive log data, which may include user credentials. To exploit this vulnerability, the attacker would need to have valid credentials at the operator level or higher on the affected device.
History

Wed, 13 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-08-17T18:00:53.489875Z

Updated: 2024-11-13T18:15:18.702Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3447

cve-icon Vulnrichment

Updated: 2024-08-04T07:37:54.219Z

cve-icon NVD

Status : Modified

Published: 2020-08-17T18:15:13.290

Modified: 2024-11-21T05:31:05.113

Link: CVE-2020-3447

cve-icon Redhat

No data.