Description
A vulnerability in the CLI of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software in multiple context mode could allow an authenticated, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files.

This vulnerability is due to improper access controls for Secure Copy Protocol (SCP) operations when the CiscoSSH stack is enabled. An attacker could exploit this vulnerability by authenticating to a non-admin context of the device and issuing crafted SCP copy commands in that non-admin context. A successful exploit could allow the attacker to read, create, or overwrite sensitive files that belong to another context, including the admin and system contexts. The attacker cannot directly impact the availability of services pertaining to other contexts. To exploit this vulnerability, the attacker must have valid administrative credentials for a non-admin context.

Note: An attacker cannot list or enumerate files from another context and would need to know the exact file path, which increases the complexity of a successful attack.
Published: 2026-03-04
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Cross-context File Access
Action: Apply Patch
AI Analysis

Impact

A flaw in the command-line interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software operating in multi‑context mode permits an authenticated, local attacker who holds administrative privileges in one context to copy files to or from another context via Secure Copy Protocol (SCP). The vulnerability stems from improper access controls when the CiscoSSH stack is enabled, allowing the attacker to read, create, or overwrite sensitive files belonging to other contexts, including the admin and system contexts. While direct availability impact is limited, compromise of configuration files can undermine the integrity and confidentiality of the affected context.

Affected Systems

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software running in multiple context mode. No specific affected versions are provided in the advisory.

Risk and Exploitability

The CVSS score of 7.2 indicates a high severity, with an EPSS score below 1% and no listing in the CISA KEV catalog. The attack requires a valid administrative credential for a non‑admin context and knowledge of the exact file path, raising the complexity of exploitation. The attacker cannot enumerate files, so the vector is local and authenticated, but the impact on confidentiality and integrity is significant, especially for configuration files.

Generated by OpenCVE AI on April 16, 2026 at 13:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco ASA security patch referenced in the Cisco Security Advisory to fix the SCP access‑control flaw.
  • If the CISCOSSH stack is not needed, disable it or restrict SCP access by configuration.
  • Ensure that only trusted users have administrative rights in non‑admin contexts; remove or limit such privileges where possible.

Generated by OpenCVE AI on April 16, 2026 at 13:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Vendors & Products Cisco
Cisco adaptive Security Appliance Software

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the CLI of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software in multiple context mode could allow an authenticated, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files. This vulnerability is due to improper access controls for Secure Copy Protocol (SCP) operations when the CiscoSSH stack is enabled. An attacker could exploit this vulnerability by authenticating to a non-admin context of the device and issuing crafted SCP copy commands in that non-admin context. A successful exploit could allow the attacker to read, create, or overwrite sensitive files that belong to another context, including the admin and system contexts. The attacker cannot directly impact the availability of services pertaining to other contexts. To exploit this vulnerability, the attacker must have valid administrative credentials for a non-admin context. Note: An attacker cannot list or enumerate files from another context and would need to know the exact file path, which increases the complexity of a successful attack.
Weaknesses CWE-279
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Cisco Adaptive Security Appliance Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-05T04:55:48.209Z

Reserved: 2025-10-08T11:59:15.356Z

Link: CVE-2026-20062

cve-icon Vulnrichment

Updated: 2026-03-04T20:53:17.184Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:20.910

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses