{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:15:07.921","vulnerabilities":[{"cve":{"id":"CVE-2026-20062","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:20.910","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the CLI of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software in multiple context mode could allow an authenticated, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files.\r  \r This vulnerability is due to improper access controls for Secure Copy Protocol (SCP) operations when the CiscoSSH stack is enabled. An attacker could exploit this vulnerability by authenticating to a non-admin context of the device and issuing crafted SCP copy commands in that non-admin context. A successful exploit could allow the attacker to read, create, or overwrite sensitive files that belong to another context, including the admin and system contexts. The attacker cannot directly impact the availability of services pertaining to other contexts. To exploit this vulnerability, the attacker must have valid administrative credentials for a non-admin context.\r  \r Note: An attacker cannot list or enumerate files from another context and would need to know the exact file path, which increases the complexity of a successful attack."},{"lang":"es","value":"Una vulnerabilidad en la CLI del software Cisco Secure Cortafuegos Adaptive Security Appliance (ASA) en modo de contexto múltiple podría permitir a un atacante local autenticado con privilegios administrativos en un contexto copiar archivos hacia o desde otro contexto, incluyendo archivos de configuración. Esta vulnerabilidad se debe a controles de acceso inadecuados para operaciones del Protocolo de Copia Segura (SCP) cuando la pila CiscoSSH está habilitada. Un atacante podría explotar esta vulnerabilidad autenticándose en un contexto no administrativo del dispositivo y emitiendo comandos SCP de copia manipulados en ese contexto no administrativo. Un exploit exitoso podría permitir al atacante leer, crear o sobrescribir archivos sensibles que pertenecen a otro contexto, incluyendo los contextos de administrador y de sistema. El atacante no puede impactar directamente la disponibilidad de los servicios pertenecientes a otros contextos. Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas válidas para un contexto no administrativo. Nota: Un atacante no puede listar o enumerar archivos de otro contexto y necesitaría conocer la ruta exacta del archivo, lo que aumenta la complejidad de un ataque exitoso."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":5.8}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-279"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-scpcxt-filecpy-rgeP73nE","source":"psirt@cisco.com"}]}}]}