{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20388","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2023-11-08T15:08:07.658Z","datePublished":"2024-10-23T17:35:24.772Z","dateUpdated":"2024-10-24T16:24:24.678Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-10-23T17:35:24.772Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.\r\n\r This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset."}],"affected":[{"vendor":"Cisco","product":"Cisco Firepower Management Center","versions":[{"version":"6.2.3","status":"affected"},{"version":"6.2.3.1","status":"affected"},{"version":"6.2.3.2","status":"affected"},{"version":"6.2.3.3","status":"affected"},{"version":"6.2.3.4","status":"affected"},{"version":"6.2.3.5","status":"affected"},{"version":"6.2.3.6","status":"affected"},{"version":"6.2.3.7","status":"affected"},{"version":"6.2.3.9","status":"affected"},{"version":"6.2.3.10","status":"affected"},{"version":"6.2.3.11","status":"affected"},{"version":"6.2.3.12","status":"affected"},{"version":"6.2.3.13","status":"affected"},{"version":"6.2.3.14","status":"affected"},{"version":"6.2.3.15","status":"affected"},{"version":"6.2.3.8","status":"affected"},{"version":"6.2.3.16","status":"affected"},{"version":"6.2.3.17","status":"affected"},{"version":"6.2.3.18","status":"affected"},{"version":"6.4.0","status":"affected"},{"version":"6.4.0.1","status":"affected"},{"version":"6.4.0.3","status":"affected"},{"version":"6.4.0.2","status":"affected"},{"version":"6.4.0.4","status":"affected"},{"version":"6.4.0.5","status":"affected"},{"version":"6.4.0.6","status":"affected"},{"version":"6.4.0.7","status":"affected"},{"version":"6.4.0.8","status":"affected"},{"version":"6.4.0.9","status":"affected"},{"version":"6.4.0.10","status":"affected"},{"version":"6.4.0.11","status":"affected"},{"version":"6.4.0.12","status":"affected"},{"version":"6.4.0.13","status":"affected"},{"version":"6.4.0.14","status":"affected"},{"version":"6.4.0.15","status":"affected"},{"version":"6.4.0.16","status":"affected"},{"version":"6.4.0.17","status":"affected"},{"version":"6.4.0.18","status":"affected"},{"version":"6.6.0","status":"affected"},{"version":"6.6.0.1","status":"affected"},{"version":"6.6.1","status":"affected"},{"version":"6.6.3","status":"affected"},{"version":"6.6.4","status":"affected"},{"version":"6.6.5","status":"affected"},{"version":"6.6.5.1","status":"affected"},{"version":"6.6.5.2","status":"affected"},{"version":"6.6.7","status":"affected"},{"version":"6.6.7.1","status":"affected"},{"version":"6.6.7.2","status":"affected"},{"version":"6.7.0","status":"affected"},{"version":"6.7.0.1","status":"affected"},{"version":"6.7.0.2","status":"affected"},{"version":"6.7.0.3","status":"affected"},{"version":"7.0.0","status":"affected"},{"version":"7.0.0.1","status":"affected"},{"version":"7.0.1","status":"affected"},{"version":"7.0.1.1","status":"affected"},{"version":"7.0.2","status":"affected"},{"version":"7.0.2.1","status":"affected"},{"version":"7.0.3","status":"affected"},{"version":"7.0.4","status":"affected"},{"version":"7.0.5","status":"affected"},{"version":"7.0.6","status":"affected"},{"version":"7.0.6.1","status":"affected"},{"version":"7.0.6.2","status":"affected"},{"version":"7.1.0","status":"affected"},{"version":"7.1.0.1","status":"affected"},{"version":"7.1.0.2","status":"affected"},{"version":"7.1.0.3","status":"affected"},{"version":"7.2.0","status":"affected"},{"version":"7.2.1","status":"affected"},{"version":"7.2.2","status":"affected"},{"version":"7.2.0.1","status":"affected"},{"version":"7.2.3","status":"affected"},{"version":"7.2.3.1","status":"affected"},{"version":"7.2.4","status":"affected"},{"version":"7.2.4.1","status":"affected"},{"version":"7.2.5","status":"affected"},{"version":"7.2.5.1","status":"affected"},{"version":"7.2.6","status":"affected"},{"version":"7.2.7","status":"affected"},{"version":"7.2.5.2","status":"affected"},{"version":"7.2.8","status":"affected"},{"version":"7.2.8.1","status":"affected"},{"version":"7.3.0","status":"affected"},{"version":"7.3.1","status":"affected"},{"version":"7.3.1.1","status":"affected"},{"version":"7.3.1.2","status":"affected"},{"version":"7.4.0","status":"affected"},{"version":"7.4.1","status":"affected"},{"version":"7.4.1.1","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Firepower Threat Defense Software","versions":[{"version":"6.6.5.1","status":"affected"},{"version":"6.6.7","status":"affected"},{"version":"6.4.0.4","status":"affected"},{"version":"6.4.0.10","status":"affected"},{"version":"6.4.0.12","status":"affected"},{"version":"6.4.0.14","status":"affected"},{"version":"6.4.0.16","status":"affected"},{"version":"6.4.0.18","status":"affected"},{"version":"6.7.0.2","status":"affected"},{"version":"7.1.0.1","status":"affected"},{"version":"7.1.0.3","status":"affected"},{"version":"7.2.2","status":"affected"},{"version":"7.4.1","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Exposure of Sensitive Information Through Data Queries","type":"cwe","cweId":"CWE-202"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer","name":"cisco-sa-fmc-xss-infodisc-RL4mJFer"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."}],"source":{"advisory":"cisco-sa-fmc-xss-infodisc-RL4mJFer","discovery":"EXTERNAL","defects":["CSCwj03056"]}},"adp":[{"affected":[{"vendor":"cisco","product":"firepower_management_center","cpes":["cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.2.3","status":"affected","lessThanOrEqual":"6.2.3.18","versionType":"custom"},{"version":"6.4.0","status":"affected","lessThanOrEqual":"6.4.0.18","versionType":"custom"},{"version":"6.6.0","status":"affected","lessThanOrEqual":"6.6.7.2","versionType":"custom"},{"version":"6.7.0","status":"affected","lessThanOrEqual":"6.7.0.3","versionType":"custom"},{"version":"7.0.0","status":"affected","lessThanOrEqual":"7.0.6.2","versionType":"custom"},{"version":"7.1.0","status":"affected","lessThanOrEqual":"7.1.0.3","versionType":"custom"},{"version":"7.2.0","status":"affected","lessThanOrEqual":"7.2.8.1","versionType":"custom"},{"version":"7.3.0","status":"affected","lessThanOrEqual":"7.3.1.2","versionType":"custom"},{"version":"7.4.0","status":"affected","lessThanOrEqual":"7.4.1.1","versionType":"custom"}]},{"vendor":"cisco","product":"firepower_threat_defense_software","cpes":["cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.4.0.4","status":"affected","lessThanOrEqual":"6.4.0.18","versionType":"custom"},{"version":"6.6.5.1","status":"affected","lessThanOrEqual":"6.6.7","versionType":"custom"},{"version":"6.7.0.2","status":"affected"},{"version":"7.1.0.1","status":"affected","lessThanOrEqual":"7.1.0.3","versionType":"custom"},{"version":"7.2.2","status":"affected"},{"version":"7.4.1","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T18:45:56.491861Z","id":"CVE-2024-20388","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-24T16:24:24.678Z"}}]}}