CVE-2020-3186 (CNNVD-202005-199)
中文标题:
Cisco Firepower Threat Defense 访问控制错误漏洞
英文标题:
Cisco Firepower Threat Defense Software Management Access List Bypass Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)是美国思科(Cisco)公司的一套提供下一代防火墙服务的统一软件。 Cisco FTD 6.3.0版本、6.4.0版本和6.5.0版本中存在访问控制错误漏洞,该漏洞源于配置了不同的管理访问列表,一个访问列表中所允许访问的端口在另一个访问列表中则被禁止。攻击者可通过将特制的远程管理流量发送到受影响系统的本地IP地址利用该漏洞绕过已配置的管理接口访问列表。
英文描述:
A vulnerability in the management access list configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured management interface access list on an affected system. The vulnerability is due to the configuration of different management access lists, with ports allowed in one access list and denied in another. An attacker could exploit this vulnerability by sending crafted remote management traffic to the local IP address of an affected system. A successful exploit could allow the attacker to bypass the configured management access list policies, and traffic to the management interface would not be properly denied.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Firepower Threat Defense Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_firepower_threat_defense_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.12\(1.6\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\(1.6\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 201.5\(23.16\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:201.5\(23.16\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3186 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3186 |
2025-11-11 14:56:58 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202005-199 |
2025-11-11 15:10:25 | 2025-11-11 07:56:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202005-199
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 26
- data_sources: ['cve'] -> ['cve', 'nvd']