CVE-2020-3187

CRITICAL EXPLOITED NUCLEI

Cisco ASA/FTD - Path Traversal

Title source: llm

Description

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.

Exploits (6)

nomisec WORKING POC 1 stars
by CrackerCat · poc
https://github.com/CrackerCat/CVE-2020-3187
nomisec SCANNER 1 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2020-3187
nomisec NO CODE
by 1337in · poc
https://github.com/1337in/CVE-2020-3187
nomisec SCANNER
by sunyyer · infoleak
https://github.com/sunyyer/CVE-2020-3187-Scanlist
nomisec WORKING POC
by sujaygr8 · poc
https://github.com/sujaygr8/CVE-2020-3187
exploitdb WORKING POC
by 0xmmnbassel · bashwebappshardware
https://www.exploit-db.com/exploits/48723

Nuclei Templates (1)

Cisco Adaptive Security Appliance Software/Cisco Firepower Threat Defense - Directory Traversal
CRITICALby KareemSe1im

Scores

CVSS v3 9.1
EPSS 0.9434
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploitation Intel

VulnCheck KEV 2025-05-22

Classification

CWE
CWE-22
Status published

Affected Products (14)

cisco/firepower_threat_defense < 6.2.3.16
cisco/asa_5505_firmware
cisco/asa_5510_firmware
cisco/asa_5512-x_firmware
cisco/asa_5515-x_firmware
cisco/asa_5520_firmware
cisco/asa_5525-x_firmware
cisco/asa_5540_firmware
cisco/asa_5545-x_firmware
cisco/asa_5550_firmware
cisco/asa_5555-x_firmware
cisco/asa_5580_firmware
cisco/asa_5585-x_firmware
cisco/adaptive_security_appliance_software < 9.6.4.40

Timeline

Published May 06, 2020
Tracked Since Feb 18, 2026