Cisco Content Security Management Appliance Open Redirect Multiple Vulnerabilities (cisco-sa-sma-opn-rdrct-yPPMdsMQ)

Medium Nessus Plugin ID 136748


The remote device is missing a vendor-supplied security patch


According to its self-reported version, Cisco Content Security Management Appliance (SMA) is affected by multiple vulnerabilities in the web-based GUI due to improper input validation of the parameters of an HTTP request. An unauthenticated, remote attacker can exploit these, by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL, in order to redirect the user to a malicious web page or to obtain sensitive browser-based information.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvq83107, CSCvr82721

See Also

Plugin Details

Severity: Medium

ID: 136748

File Name: cisco-sa-sma-opn-rdrct-yPPMdsMQ.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 2020/05/21

Updated: 2020/05/27

Dependencies: 69078

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2020-3178

CVSS Score Rationale: Based on vendor advisory

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:content_security_management_appliance_(sma)

Required KB Items: Host/AsyncOS/Cisco Content Security Management Appliance/DisplayVersion, Host/AsyncOS/Cisco Content Security Management Appliance/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/05/06

Vulnerability Publication Date: 2020/05/06

Reference Information

CVE: CVE-2020-3178

CISCO-BUG-ID: CSCvq83107, CSCvr82721

CISCO-SA: cisco-sa-sma-opn-rdrct-yPPMdsMQ

IAVA: 2020-A-0218

CWE: 601