CVE-2026-20069 (GCVE-0-2026-20069)
Vulnerability from cvelistv5
Published
2026-03-04 17:51
Modified
2026-03-04 20:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Summary
A vulnerability in the VPN web services component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device.
This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious HTTP requests to a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting (XSS) attacks. The attacker is not able to directly impact the affected device.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Secure Firewall Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.12.1 Version: 9.12.2 Version: 9.12.4 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.2.5 Version: 9.12.3.12 Version: 9.12.1.3 Version: 9.12.2.4 Version: 9.12.1.2 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.8 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.16.1 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.12.4.29 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.12.4.35 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.17.1 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.18.1 Version: 9.12.4.47 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.17.1.15 Version: 9.12.4.52 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.16.4.14 Version: 9.18.3 Version: 9.19.1.5 Version: 9.12.4.56 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.23.1 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.16.4.76 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.3 Version: 9.20.3.10 Version: 9.22.1.2 Version: 9.18.4.52 Version: 9.20.3.13 Version: 9.22.1.6 Version: 9.18.4.53 Version: 9.16.4.82 Version: 9.22.2 Version: 9.20.3.16 Version: 9.19.1.42 Version: 9.18.4.57 Version: 9.16.4.84 Version: 9.23.1.3 Version: 9.20.3.20 Version: 9.22.2.4 Version: 9.23.1.7 Version: 9.20.4 Version: 9.22.2.9 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20069",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-04T20:23:58.500231Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-04T20:24:29.280Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "9.12.3"
},
{
"status": "affected",
"version": "9.12.1"
},
{
"status": "affected",
"version": "9.12.2"
},
{
"status": "affected",
"version": "9.12.4"
},
{
"status": "affected",
"version": "9.12.3.2"
},
{
"status": "affected",
"version": "9.12.3.7"
},
{
"status": "affected",
"version": "9.12.2.5"
},
{
"status": "affected",
"version": "9.12.3.12"
},
{
"status": "affected",
"version": "9.12.1.3"
},
{
"status": "affected",
"version": "9.12.2.4"
},
{
"status": "affected",
"version": "9.12.1.2"
},
{
"status": "affected",
"version": "9.12.2.9"
},
{
"status": "affected",
"version": "9.12.3.9"
},
{
"status": "affected",
"version": "9.12.2.1"
},
{
"status": "affected",
"version": "9.12.4.2"
},
{
"status": "affected",
"version": "9.12.4.4"
},
{
"status": "affected",
"version": "9.12.4.7"
},
{
"status": "affected",
"version": "9.12.4.8"
},
{
"status": "affected",
"version": "9.12.4.10"
},
{
"status": "affected",
"version": "9.12.4.13"
},
{
"status": "affected",
"version": "9.12.4.18"
},
{
"status": "affected",
"version": "9.12.4.24"
},
{
"status": "affected",
"version": "9.16.1"
},
{
"status": "affected",
"version": "9.12.4.26"
},
{
"status": "affected",
"version": "9.16.1.28"
},
{
"status": "affected",
"version": "9.12.4.29"
},
{
"status": "affected",
"version": "9.16.2"
},
{
"status": "affected",
"version": "9.12.4.30"
},
{
"status": "affected",
"version": "9.16.2.3"
},
{
"status": "affected",
"version": "9.12.4.35"
},
{
"status": "affected",
"version": "9.16.2.7"
},
{
"status": "affected",
"version": "9.12.4.37"
},
{
"status": "affected",
"version": "9.17.1"
},
{
"status": "affected",
"version": "9.16.2.11"
},
{
"status": "affected",
"version": "9.16.2.13"
},
{
"status": "affected",
"version": "9.12.4.39"
},
{
"status": "affected",
"version": "9.12.4.38"
},
{
"status": "affected",
"version": "9.16.2.14"
},
{
"status": "affected",
"version": "9.17.1.7"
},
{
"status": "affected",
"version": "9.12.4.40"
},
{
"status": "affected",
"version": "9.16.3.3"
},
{
"status": "affected",
"version": "9.16.3"
},
{
"status": "affected",
"version": "9.16.3.14"
},
{
"status": "affected",
"version": "9.17.1.9"
},
{
"status": "affected",
"version": "9.12.4.41"
},
{
"status": "affected",
"version": "9.17.1.10"
},
{
"status": "affected",
"version": "9.18.1"
},
{
"status": "affected",
"version": "9.12.4.47"
},
{
"status": "affected",
"version": "9.16.3.15"
},
{
"status": "affected",
"version": "9.18.1.3"
},
{
"status": "affected",
"version": "9.17.1.11"
},
{
"status": "affected",
"version": "9.12.4.48"
},
{
"status": "affected",
"version": "9.18.2"
},
{
"status": "affected",
"version": "9.16.3.19"
},
{
"status": "affected",
"version": "9.17.1.13"
},
{
"status": "affected",
"version": "9.12.4.50"
},
{
"status": "affected",
"version": "9.17.1.15"
},
{
"status": "affected",
"version": "9.12.4.52"
},
{
"status": "affected",
"version": "9.16.3.23"
},
{
"status": "affected",
"version": "9.18.2.5"
},
{
"status": "affected",
"version": "9.16.4"
},
{
"status": "affected",
"version": "9.12.4.54"
},
{
"status": "affected",
"version": "9.17.1.20"
},
{
"status": "affected",
"version": "9.18.2.7"
},
{
"status": "affected",
"version": "9.19.1"
},
{
"status": "affected",
"version": "9.16.4.9"
},
{
"status": "affected",
"version": "9.12.4.55"
},
{
"status": "affected",
"version": "9.18.2.8"
},
{
"status": "affected",
"version": "9.16.4.14"
},
{
"status": "affected",
"version": "9.18.3"
},
{
"status": "affected",
"version": "9.19.1.5"
},
{
"status": "affected",
"version": "9.12.4.56"
},
{
"status": "affected",
"version": "9.17.1.30"
},
{
"status": "affected",
"version": "9.19.1.9"
},
{
"status": "affected",
"version": "9.18.3.39"
},
{
"status": "affected",
"version": "9.16.4.19"
},
{
"status": "affected",
"version": "9.12.4.58"
},
{
"status": "affected",
"version": "9.19.1.12"
},
{
"status": "affected",
"version": "9.18.3.46"
},
{
"status": "affected",
"version": "9.16.4.27"
},
{
"status": "affected",
"version": "9.19.1.18"
},
{
"status": "affected",
"version": "9.18.3.53"
},
{
"status": "affected",
"version": "9.18.3.55"
},
{
"status": "affected",
"version": "9.16.4.38"
},
{
"status": "affected",
"version": "9.17.1.33"
},
{
"status": "affected",
"version": "9.12.4.62"
},
{
"status": "affected",
"version": "9.16.4.39"
},
{
"status": "affected",
"version": "9.18.3.56"
},
{
"status": "affected",
"version": "9.20.1"
},
{
"status": "affected",
"version": "9.16.4.42"
},
{
"status": "affected",
"version": "9.19.1.22"
},
{
"status": "affected",
"version": "9.18.4"
},
{
"status": "affected",
"version": "9.20.1.5"
},
{
"status": "affected",
"version": "9.18.4.5"
},
{
"status": "affected",
"version": "9.19.1.24"
},
{
"status": "affected",
"version": "9.16.4.48"
},
{
"status": "affected",
"version": "9.18.4.8"
},
{
"status": "affected",
"version": "9.20.2"
},
{
"status": "affected",
"version": "9.19.1.27"
},
{
"status": "affected",
"version": "9.12.4.65"
},
{
"status": "affected",
"version": "9.16.4.55"
},
{
"status": "affected",
"version": "9.18.4.22"
},
{
"status": "affected",
"version": "9.20.2.10"
},
{
"status": "affected",
"version": "9.16.4.57"
},
{
"status": "affected",
"version": "9.19.1.28"
},
{
"status": "affected",
"version": "9.17.1.39"
},
{
"status": "affected",
"version": "9.12.4.67"
},
{
"status": "affected",
"version": "9.18.4.24"
},
{
"status": "affected",
"version": "9.20.2.21"
},
{
"status": "affected",
"version": "9.16.4.61"
},
{
"status": "affected",
"version": "9.19.1.31"
},
{
"status": "affected",
"version": "9.18.4.29"
},
{
"status": "affected",
"version": "9.20.2.22"
},
{
"status": "affected",
"version": "9.16.4.62"
},
{
"status": "affected",
"version": "9.18.4.34"
},
{
"status": "affected",
"version": "9.20.3"
},
{
"status": "affected",
"version": "9.16.4.67"
},
{
"status": "affected",
"version": "9.16.4.70"
},
{
"status": "affected",
"version": "9.18.4.40"
},
{
"status": "affected",
"version": "9.23.1"
},
{
"status": "affected",
"version": "9.22.1.1"
},
{
"status": "affected",
"version": "9.16.4.71"
},
{
"status": "affected",
"version": "9.20.3.4"
},
{
"status": "affected",
"version": "9.18.4.47"
},
{
"status": "affected",
"version": "9.20.3.7"
},
{
"status": "affected",
"version": "9.17.1.45"
},
{
"status": "affected",
"version": "9.19.1.37"
},
{
"status": "affected",
"version": "9.17.1.46"
},
{
"status": "affected",
"version": "9.16.4.76"
},
{
"status": "affected",
"version": "9.20.3.9"
},
{
"status": "affected",
"version": "9.19.1.38"
},
{
"status": "affected",
"version": "9.18.4.50"
},
{
"status": "affected",
"version": "9.22.1.3"
},
{
"status": "affected",
"version": "9.20.3.10"
},
{
"status": "affected",
"version": "9.22.1.2"
},
{
"status": "affected",
"version": "9.18.4.52"
},
{
"status": "affected",
"version": "9.20.3.13"
},
{
"status": "affected",
"version": "9.22.1.6"
},
{
"status": "affected",
"version": "9.18.4.53"
},
{
"status": "affected",
"version": "9.16.4.82"
},
{
"status": "affected",
"version": "9.22.2"
},
{
"status": "affected",
"version": "9.20.3.16"
},
{
"status": "affected",
"version": "9.19.1.42"
},
{
"status": "affected",
"version": "9.18.4.57"
},
{
"status": "affected",
"version": "9.16.4.84"
},
{
"status": "affected",
"version": "9.23.1.3"
},
{
"status": "affected",
"version": "9.20.3.20"
},
{
"status": "affected",
"version": "9.22.2.4"
},
{
"status": "affected",
"version": "9.23.1.7"
},
{
"status": "affected",
"version": "9.20.4"
},
{
"status": "affected",
"version": "9.22.2.9"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Secure Firewall Threat Defense (FTD) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.4.0.1"
},
{
"status": "affected",
"version": "6.4.0.2"
},
{
"status": "affected",
"version": "6.4.0.5"
},
{
"status": "affected",
"version": "6.4.0"
},
{
"status": "affected",
"version": "6.4.0.3"
},
{
"status": "affected",
"version": "6.4.0.4"
},
{
"status": "affected",
"version": "6.4.0.6"
},
{
"status": "affected",
"version": "6.4.0.7"
},
{
"status": "affected",
"version": "6.4.0.8"
},
{
"status": "affected",
"version": "6.4.0.9"
},
{
"status": "affected",
"version": "6.4.0.10"
},
{
"status": "affected",
"version": "6.4.0.11"
},
{
"status": "affected",
"version": "6.4.0.12"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.0.1"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.1.0"
},
{
"status": "affected",
"version": "6.4.0.13"
},
{
"status": "affected",
"version": "7.0.1.1"
},
{
"status": "affected",
"version": "6.4.0.14"
},
{
"status": "affected",
"version": "7.1.0.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "6.4.0.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.0.2.1"
},
{
"status": "affected",
"version": "7.0.3"
},
{
"status": "affected",
"version": "7.1.0.2"
},
{
"status": "affected",
"version": "7.2.0.1"
},
{
"status": "affected",
"version": "7.0.4"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.0.5"
},
{
"status": "affected",
"version": "6.4.0.16"
},
{
"status": "affected",
"version": "7.3.0"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.2.3"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.0.3"
},
{
"status": "affected",
"version": "7.2.4"
},
{
"status": "affected",
"version": "7.0.6"
},
{
"status": "affected",
"version": "7.2.5"
},
{
"status": "affected",
"version": "7.2.4.1"
},
{
"status": "affected",
"version": "7.3.1.1"
},
{
"status": "affected",
"version": "7.4.0"
},
{
"status": "affected",
"version": "6.4.0.17"
},
{
"status": "affected",
"version": "7.0.6.1"
},
{
"status": "affected",
"version": "7.2.5.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.6"
},
{
"status": "affected",
"version": "7.0.6.2"
},
{
"status": "affected",
"version": "7.4.1.1"
},
{
"status": "affected",
"version": "6.4.0.18"
},
{
"status": "affected",
"version": "7.2.7"
},
{
"status": "affected",
"version": "7.2.5.2"
},
{
"status": "affected",
"version": "7.3.1.2"
},
{
"status": "affected",
"version": "7.2.8"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.2.8.1"
},
{
"status": "affected",
"version": "7.0.6.3"
},
{
"status": "affected",
"version": "7.4.2.1"
},
{
"status": "affected",
"version": "7.2.9"
},
{
"status": "affected",
"version": "7.0.7"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"status": "affected",
"version": "7.4.2.2"
},
{
"status": "affected",
"version": "7.2.10"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.4.2.3"
},
{
"status": "affected",
"version": "7.0.8"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.7.10"
},
{
"status": "affected",
"version": "7.0.8.1"
},
{
"status": "affected",
"version": "7.6.2.1"
},
{
"status": "affected",
"version": "7.7.10.1"
},
{
"status": "affected",
"version": "7.4.2.4"
},
{
"status": "affected",
"version": "7.2.10.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VPN web services component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device.\r\n\r\nThis vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious HTTP requests to a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting (XSS) attacks. The attacker is not able to directly impact the affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-04T17:51:01.338Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-asaftd-desync-n5AVzEQw",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-desync-n5AVzEQw"
}
],
"source": {
"advisory": "cisco-sa-asaftd-desync-n5AVzEQw",
"defects": [
"CSCwq02055"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20069",
"datePublished": "2026-03-04T17:51:01.338Z",
"dateReserved": "2025-10-08T11:59:15.357Z",
"dateUpdated": "2026-03-04T20:24:29.280Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-20069\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-04T20:23:58.500231Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-04T20:24:18.452Z\"}}], \"cna\": {\"title\": \"Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability\", \"source\": {\"defects\": [\"CSCwq02055\"], \"advisory\": \"cisco-sa-asaftd-desync-n5AVzEQw\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.12.3\"}, {\"status\": \"affected\", \"version\": \"9.12.1\"}, {\"status\": \"affected\", \"version\": \"9.12.2\"}, {\"status\": \"affected\", \"version\": \"9.12.4\"}, {\"status\": \"affected\", \"version\": \"9.12.3.2\"}, {\"status\": \"affected\", \"version\": \"9.12.3.7\"}, {\"status\": \"affected\", \"version\": \"9.12.2.5\"}, {\"status\": \"affected\", \"version\": \"9.12.3.12\"}, {\"status\": \"affected\", \"version\": \"9.12.1.3\"}, {\"status\": \"affected\", \"version\": \"9.12.2.4\"}, {\"status\": \"affected\", \"version\": \"9.12.1.2\"}, {\"status\": \"affected\", \"version\": \"9.12.2.9\"}, {\"status\": \"affected\", \"version\": \"9.12.3.9\"}, {\"status\": \"affected\", \"version\": \"9.12.2.1\"}, {\"status\": \"affected\", \"version\": \"9.12.4.2\"}, {\"status\": \"affected\", \"version\": \"9.12.4.4\"}, {\"status\": \"affected\", \"version\": \"9.12.4.7\"}, {\"status\": \"affected\", \"version\": \"9.12.4.8\"}, {\"status\": \"affected\", \"version\": \"9.12.4.10\"}, {\"status\": \"affected\", \"version\": \"9.12.4.13\"}, {\"status\": \"affected\", \"version\": \"9.12.4.18\"}, {\"status\": \"affected\", \"version\": \"9.12.4.24\"}, {\"status\": \"affected\", \"version\": \"9.16.1\"}, {\"status\": \"affected\", \"version\": \"9.12.4.26\"}, {\"status\": \"affected\", \"version\": \"9.16.1.28\"}, {\"status\": \"affected\", \"version\": \"9.12.4.29\"}, {\"status\": \"affected\", \"version\": \"9.16.2\"}, {\"status\": \"affected\", \"version\": \"9.12.4.30\"}, {\"status\": \"affected\", \"version\": \"9.16.2.3\"}, {\"status\": \"affected\", \"version\": \"9.12.4.35\"}, {\"status\": \"affected\", \"version\": \"9.16.2.7\"}, {\"status\": \"affected\", \"version\": \"9.12.4.37\"}, {\"status\": \"affected\", \"version\": \"9.17.1\"}, {\"status\": \"affected\", \"version\": \"9.16.2.11\"}, {\"status\": \"affected\", \"version\": \"9.16.2.13\"}, {\"status\": \"affected\", \"version\": \"9.12.4.39\"}, {\"status\": \"affected\", \"version\": \"9.12.4.38\"}, {\"status\": \"affected\", \"version\": \"9.16.2.14\"}, {\"status\": \"affected\", \"version\": \"9.17.1.7\"}, {\"status\": \"affected\", \"version\": \"9.12.4.40\"}, {\"status\": \"affected\", \"version\": \"9.16.3.3\"}, {\"status\": \"affected\", \"version\": \"9.16.3\"}, {\"status\": \"affected\", \"version\": \"9.16.3.14\"}, {\"status\": \"affected\", \"version\": \"9.17.1.9\"}, {\"status\": \"affected\", \"version\": \"9.12.4.41\"}, {\"status\": \"affected\", \"version\": \"9.17.1.10\"}, {\"status\": \"affected\", \"version\": \"9.18.1\"}, {\"status\": \"affected\", \"version\": \"9.12.4.47\"}, {\"status\": \"affected\", \"version\": \"9.16.3.15\"}, {\"status\": \"affected\", \"version\": \"9.18.1.3\"}, {\"status\": \"affected\", \"version\": \"9.17.1.11\"}, {\"status\": \"affected\", \"version\": \"9.12.4.48\"}, {\"status\": \"affected\", \"version\": \"9.18.2\"}, {\"status\": \"affected\", \"version\": \"9.16.3.19\"}, {\"status\": \"affected\", \"version\": \"9.17.1.13\"}, {\"status\": \"affected\", \"version\": \"9.12.4.50\"}, {\"status\": \"affected\", \"version\": \"9.17.1.15\"}, {\"status\": \"affected\", \"version\": \"9.12.4.52\"}, {\"status\": \"affected\", \"version\": \"9.16.3.23\"}, {\"status\": \"affected\", \"version\": \"9.18.2.5\"}, {\"status\": \"affected\", \"version\": \"9.16.4\"}, {\"status\": \"affected\", \"version\": \"9.12.4.54\"}, {\"status\": \"affected\", \"version\": \"9.17.1.20\"}, {\"status\": \"affected\", \"version\": \"9.18.2.7\"}, {\"status\": \"affected\", \"version\": \"9.19.1\"}, {\"status\": \"affected\", \"version\": \"9.16.4.9\"}, {\"status\": \"affected\", \"version\": \"9.12.4.55\"}, {\"status\": \"affected\", \"version\": \"9.18.2.8\"}, {\"status\": \"affected\", \"version\": \"9.16.4.14\"}, {\"status\": \"affected\", \"version\": \"9.18.3\"}, {\"status\": \"affected\", \"version\": \"9.19.1.5\"}, {\"status\": \"affected\", \"version\": \"9.12.4.56\"}, {\"status\": \"affected\", \"version\": \"9.17.1.30\"}, {\"status\": \"affected\", \"version\": \"9.19.1.9\"}, {\"status\": \"affected\", \"version\": \"9.18.3.39\"}, {\"status\": \"affected\", \"version\": \"9.16.4.19\"}, {\"status\": \"affected\", \"version\": \"9.12.4.58\"}, {\"status\": \"affected\", \"version\": \"9.19.1.12\"}, {\"status\": \"affected\", \"version\": \"9.18.3.46\"}, {\"status\": \"affected\", \"version\": \"9.16.4.27\"}, {\"status\": \"affected\", \"version\": \"9.19.1.18\"}, {\"status\": \"affected\", \"version\": \"9.18.3.53\"}, {\"status\": \"affected\", \"version\": \"9.18.3.55\"}, {\"status\": \"affected\", \"version\": \"9.16.4.38\"}, {\"status\": \"affected\", \"version\": \"9.17.1.33\"}, {\"status\": \"affected\", \"version\": \"9.12.4.62\"}, {\"status\": \"affected\", \"version\": \"9.16.4.39\"}, {\"status\": \"affected\", \"version\": \"9.18.3.56\"}, {\"status\": \"affected\", \"version\": \"9.20.1\"}, {\"status\": \"affected\", \"version\": \"9.16.4.42\"}, {\"status\": \"affected\", \"version\": \"9.19.1.22\"}, {\"status\": \"affected\", \"version\": \"9.18.4\"}, {\"status\": \"affected\", \"version\": \"9.20.1.5\"}, {\"status\": \"affected\", \"version\": \"9.18.4.5\"}, {\"status\": \"affected\", \"version\": \"9.19.1.24\"}, {\"status\": \"affected\", \"version\": \"9.16.4.48\"}, {\"status\": \"affected\", \"version\": \"9.18.4.8\"}, {\"status\": \"affected\", \"version\": \"9.20.2\"}, {\"status\": \"affected\", \"version\": \"9.19.1.27\"}, {\"status\": \"affected\", \"version\": \"9.12.4.65\"}, {\"status\": \"affected\", \"version\": \"9.16.4.55\"}, {\"status\": \"affected\", \"version\": \"9.18.4.22\"}, {\"status\": \"affected\", \"version\": \"9.20.2.10\"}, {\"status\": \"affected\", \"version\": \"9.16.4.57\"}, {\"status\": \"affected\", \"version\": \"9.19.1.28\"}, {\"status\": \"affected\", \"version\": \"9.17.1.39\"}, {\"status\": \"affected\", \"version\": \"9.12.4.67\"}, {\"status\": \"affected\", \"version\": \"9.18.4.24\"}, {\"status\": \"affected\", \"version\": \"9.20.2.21\"}, {\"status\": \"affected\", \"version\": \"9.16.4.61\"}, {\"status\": \"affected\", \"version\": \"9.19.1.31\"}, {\"status\": \"affected\", \"version\": \"9.18.4.29\"}, {\"status\": \"affected\", \"version\": \"9.20.2.22\"}, {\"status\": \"affected\", \"version\": \"9.16.4.62\"}, {\"status\": \"affected\", \"version\": \"9.18.4.34\"}, {\"status\": \"affected\", \"version\": \"9.20.3\"}, {\"status\": \"affected\", \"version\": \"9.16.4.67\"}, {\"status\": \"affected\", \"version\": \"9.16.4.70\"}, {\"status\": \"affected\", \"version\": \"9.18.4.40\"}, {\"status\": \"affected\", \"version\": \"9.23.1\"}, {\"status\": \"affected\", \"version\": \"9.22.1.1\"}, {\"status\": \"affected\", \"version\": \"9.16.4.71\"}, {\"status\": \"affected\", \"version\": \"9.20.3.4\"}, {\"status\": \"affected\", \"version\": \"9.18.4.47\"}, {\"status\": \"affected\", \"version\": \"9.20.3.7\"}, {\"status\": \"affected\", \"version\": \"9.17.1.45\"}, {\"status\": \"affected\", \"version\": \"9.19.1.37\"}, {\"status\": \"affected\", \"version\": \"9.17.1.46\"}, {\"status\": \"affected\", \"version\": \"9.16.4.76\"}, {\"status\": \"affected\", \"version\": \"9.20.3.9\"}, {\"status\": \"affected\", \"version\": \"9.19.1.38\"}, {\"status\": \"affected\", \"version\": \"9.18.4.50\"}, {\"status\": \"affected\", \"version\": \"9.22.1.3\"}, {\"status\": \"affected\", \"version\": \"9.20.3.10\"}, {\"status\": \"affected\", \"version\": \"9.22.1.2\"}, {\"status\": \"affected\", \"version\": \"9.18.4.52\"}, {\"status\": \"affected\", \"version\": \"9.20.3.13\"}, {\"status\": \"affected\", \"version\": \"9.22.1.6\"}, {\"status\": \"affected\", \"version\": \"9.18.4.53\"}, {\"status\": \"affected\", \"version\": \"9.16.4.82\"}, {\"status\": \"affected\", \"version\": \"9.22.2\"}, {\"status\": \"affected\", \"version\": \"9.20.3.16\"}, {\"status\": \"affected\", \"version\": \"9.19.1.42\"}, {\"status\": \"affected\", \"version\": \"9.18.4.57\"}, {\"status\": \"affected\", \"version\": \"9.16.4.84\"}, {\"status\": \"affected\", \"version\": \"9.23.1.3\"}, {\"status\": \"affected\", \"version\": \"9.20.3.20\"}, {\"status\": \"affected\", \"version\": \"9.22.2.4\"}, {\"status\": \"affected\", \"version\": \"9.23.1.7\"}, {\"status\": \"affected\", \"version\": \"9.20.4\"}, {\"status\": \"affected\", \"version\": \"9.22.2.9\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Secure Firewall Threat Defense (FTD) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4.0.1\"}, {\"status\": \"affected\", \"version\": \"6.4.0.2\"}, {\"status\": \"affected\", \"version\": \"6.4.0.5\"}, {\"status\": \"affected\", \"version\": \"6.4.0\"}, {\"status\": \"affected\", \"version\": \"6.4.0.3\"}, {\"status\": \"affected\", \"version\": \"6.4.0.4\"}, {\"status\": \"affected\", \"version\": \"6.4.0.6\"}, {\"status\": \"affected\", \"version\": \"6.4.0.7\"}, {\"status\": \"affected\", \"version\": \"6.4.0.8\"}, {\"status\": \"affected\", \"version\": \"6.4.0.9\"}, {\"status\": \"affected\", \"version\": \"6.4.0.10\"}, {\"status\": \"affected\", \"version\": \"6.4.0.11\"}, {\"status\": \"affected\", \"version\": \"6.4.0.12\"}, {\"status\": \"affected\", \"version\": \"7.0.0\"}, {\"status\": \"affected\", \"version\": \"7.0.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.1\"}, {\"status\": \"affected\", \"version\": \"7.1.0\"}, {\"status\": \"affected\", \"version\": \"6.4.0.13\"}, {\"status\": \"affected\", \"version\": \"7.0.1.1\"}, {\"status\": \"affected\", \"version\": \"6.4.0.14\"}, {\"status\": \"affected\", \"version\": \"7.1.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.2\"}, {\"status\": \"affected\", \"version\": \"6.4.0.15\"}, {\"status\": \"affected\", \"version\": \"7.2.0\"}, {\"status\": \"affected\", \"version\": \"7.0.2.1\"}, {\"status\": \"affected\", \"version\": \"7.0.3\"}, {\"status\": \"affected\", \"version\": \"7.1.0.2\"}, {\"status\": \"affected\", \"version\": \"7.2.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.4\"}, {\"status\": \"affected\", \"version\": \"7.2.1\"}, {\"status\": \"affected\", \"version\": \"7.0.5\"}, {\"status\": \"affected\", \"version\": \"6.4.0.16\"}, {\"status\": \"affected\", \"version\": \"7.3.0\"}, {\"status\": \"affected\", \"version\": \"7.2.2\"}, {\"status\": \"affected\", \"version\": \"7.2.3\"}, {\"status\": \"affected\", \"version\": \"7.3.1\"}, {\"status\": \"affected\", \"version\": \"7.1.0.3\"}, {\"status\": \"affected\", \"version\": \"7.2.4\"}, {\"status\": \"affected\", \"version\": \"7.0.6\"}, {\"status\": \"affected\", \"version\": \"7.2.5\"}, {\"status\": \"affected\", \"version\": \"7.2.4.1\"}, {\"status\": \"affected\", \"version\": \"7.3.1.1\"}, {\"status\": \"affected\", \"version\": \"7.4.0\"}, {\"status\": \"affected\", \"version\": \"6.4.0.17\"}, {\"status\": \"affected\", \"version\": \"7.0.6.1\"}, {\"status\": \"affected\", \"version\": \"7.2.5.1\"}, {\"status\": \"affected\", \"version\": \"7.4.1\"}, {\"status\": \"affected\", \"version\": \"7.2.6\"}, {\"status\": \"affected\", \"version\": \"7.0.6.2\"}, {\"status\": \"affected\", \"version\": \"7.4.1.1\"}, {\"status\": \"affected\", \"version\": \"6.4.0.18\"}, {\"status\": \"affected\", \"version\": \"7.2.7\"}, {\"status\": \"affected\", \"version\": \"7.2.5.2\"}, {\"status\": \"affected\", \"version\": \"7.3.1.2\"}, {\"status\": \"affected\", \"version\": \"7.2.8\"}, {\"status\": \"affected\", \"version\": \"7.6.0\"}, {\"status\": \"affected\", \"version\": \"7.4.2\"}, {\"status\": \"affected\", \"version\": \"7.2.8.1\"}, {\"status\": \"affected\", \"version\": \"7.0.6.3\"}, {\"status\": \"affected\", \"version\": \"7.4.2.1\"}, {\"status\": \"affected\", \"version\": \"7.2.9\"}, {\"status\": \"affected\", \"version\": \"7.0.7\"}, {\"status\": \"affected\", \"version\": \"7.7.0\"}, {\"status\": \"affected\", \"version\": \"7.4.2.2\"}, {\"status\": \"affected\", \"version\": \"7.2.10\"}, {\"status\": \"affected\", \"version\": \"7.6.1\"}, {\"status\": \"affected\", \"version\": \"7.4.2.3\"}, {\"status\": \"affected\", \"version\": \"7.0.8\"}, {\"status\": \"affected\", \"version\": \"7.6.2\"}, {\"status\": \"affected\", \"version\": \"7.7.10\"}, {\"status\": \"affected\", \"version\": \"7.0.8.1\"}, {\"status\": \"affected\", \"version\": \"7.6.2.1\"}, {\"status\": \"affected\", \"version\": \"7.7.10.1\"}, {\"status\": \"affected\", \"version\": \"7.4.2.4\"}, {\"status\": \"affected\", \"version\": \"7.2.10.2\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco\\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-desync-n5AVzEQw\", \"name\": \"cisco-sa-asaftd-desync-n5AVzEQw\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the VPN web services component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device.\\r\\n\\r\\nThis vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious HTTP requests to a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting (XSS) attacks. The attacker is not able to directly impact the affected device.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-444\", \"description\": \"Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2026-03-04T17:51:01.338Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-20069\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-04T20:24:29.280Z\", \"dateReserved\": \"2025-10-08T11:59:15.357Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2026-03-04T17:51:01.338Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…