Description
A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the SAML feature and access sensitive, browser-based information.

This vulnerability is due to insufficient input validation of multiple HTTP parameters. An attacker could exploit this vulnerability by persuading a user to access a malicious link. A successful exploit could allow the attacker to conduct a reflected XSS attack through an affected device.
Published: 2026-03-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting via the SAML SSO feature
Action: Apply Patch
AI Analysis

Impact

The flaw arises from inadequate validation of HTTP parameters within the SAML 2.0 SSO functionality of Cisco Secure Firewall Adaptive Security Appliance and Threat Defense software. An attacker can craft a malicious URL that reflects unsanitized user input back to the victim’s browser, enabling a reflected cross‑site scripting attack. This could compromise confidential data stored or displayed in the browser context and potentially lead to unauthorized actions performed on behalf of the user.

Affected Systems

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are affected. The vulnerability applies to all versions that include the unpatched SAML component, as no specific version string is provided.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate impact, while the EPSS score of less than 1% suggests a low probability of exploitation in the current environment. The vulnerability is not listed in the KEV catalog, but it can be exploited remotely by an unauthenticated attacker who convinces a user to click a crafted link. Successful exploitation would allow the attacker to inject and execute arbitrary scripts in the victim’s browser session, potentially exfiltrating sensitive data or POSTing malicious requests from the user’s authenticated session.

Generated by OpenCVE AI on April 16, 2026 at 13:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco firmware patch that sanitizes SAML HTTP parameters.
  • Temporarily disable the SAML SSO feature or restrict it to trusted networks until patches are applied.
  • Perform a comprehensive scan for injected scripts in the current configuration and monitor logs for anomalous SAML requests.

Generated by OpenCVE AI on April 16, 2026 at 13:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco firepower Threat Defense Software
CPEs cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco firepower Threat Defense Software

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the SAML feature and access sensitive, browser-based information. This vulnerability is due to insufficient input validation of multiple HTTP parameters. An attacker could exploit this vulnerability by persuading a user to access a malicious link. A successful exploit could allow the attacker&nbsp;to conduct a reflected XSS attack through an affected device.
Title Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Adaptive Security Appliance Software Firepower Threat Defense Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T18:09:27.083Z

Reserved: 2025-10-08T11:59:15.370Z

Link: CVE-2026-20102

cve-icon Vulnrichment

Updated: 2026-03-04T18:09:21.938Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T18:16:25.620

Modified: 2026-04-16T20:28:09.097

Link: CVE-2026-20102

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses