We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20352



Assignercisco
Reserved2023-11-08
Published2024-04-03
Updated2024-08-01

Description

A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.



MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Product status

10.5(1a)
affected

10.5(1)
affected

11.5(4)SU2
affected

11.5(4)SU4
affected

11.5(4)SU3
affected

11.5(1)
affected

11.5(3)
affected

11.5(2)
affected

11.5(4a)
affected

11.5(4)
affected

11.5(2a)
affected

11.5(4)SU10
affected

11.5(4)SU9
affected

11.5(4)SU11
affected

12.5(1)
affected

12.5(1)SU2
affected

12.5(1)SU3
affected

12.5(1)SU1
affected

12.5(1a)
affected

12.5(1)SU4
affected

12.5(1)SU5
affected

12.5(1)SU6
affected

12.5(1)SU7
affected

12.5(1)SU8
affected

12.5(1)SU8a
affected

12.5(1)SU8b
affected

12.0(1) SU2
affected

12.0(1) SU1
affected

12.0(1)
affected

10.0.2
affected

10.0(1)
affected

11.0(1)
affected

14SU1
affected

14SU2
affected

14
affected

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr (cisco-sa-cem-csrf-suCmNjFr)

cve.org CVE-2024-20352

nvd.nist.gov CVE-2024-20352

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20352
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.