""ET EXPLOIT Cisco ASA/Firepower Unauthenticated File Read (CVE-2020-3452) M3""

SID: 2030585

Revision: 2

Class Type: attempted-user

Metadata: affected_product Web_Server_Applications, attack_target Networking_Equipment, created_at 2020_07_23, cve CVE_2020_3452, deployment Perimeter, deployment Datacenter, deployment SSLDecrypt, signature_severity Major, updated_at 2020_07_23

Reference:

  • cve

  • 2020-3452

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "/+CSCO"

  • Value: "=.."

Within:

PCRE:

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_uri

source