Impact
A flaw in the command-line interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software operating in multi‑context mode permits an authenticated, local attacker who holds administrative privileges in one context to copy files to or from another context via Secure Copy Protocol (SCP). The vulnerability stems from improper access controls when the CiscoSSH stack is enabled, allowing the attacker to read, create, or overwrite sensitive files belonging to other contexts, including the admin and system contexts. While direct availability impact is limited, compromise of configuration files can undermine the integrity and confidentiality of the affected context.
Affected Systems
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software running in multiple context mode. No specific affected versions are provided in the advisory.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity, with an EPSS score below 1% and no listing in the CISA KEV catalog. The attack requires a valid administrative credential for a non‑admin context and knowledge of the exact file path, raising the complexity of exploitation. The attacker cannot enumerate files, so the vector is local and authenticated, but the impact on confidentiality and integrity is significant, especially for configuration files.
OpenCVE Enrichment