A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. An attacker could exploit this vulnerability by sending a crafted GET request to the web services interface. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 09:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Fri, 25 Oct 2024 03:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'Yes', 'Exploitation': 'Active', 'Technical Impact': 'Partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 05:30:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:cisco:adaptive_security_appliance_software:9.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.12:*:*:*:*:*:*:*
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.13:*:*:*:*:*:*:*
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.9:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*
Metrics kev

{'dateAdded': '2024-02-15'}

ssvc

{'options': {'Automatable': 'Yes', 'Exploitation': 'Active', 'Technical Impact': 'Partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-10-21T23:35:44.254Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3259

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:57.532Z

cve-icon NVD

Status : Analyzed

Published: 2020-05-06T17:15:12.777

Modified: 2025-10-28T13:57:45.773

Link: CVE-2020-3259

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses