CVE-2026-20062

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated local administrators in one context of Cisco ASA multi-context mode to copy files to/from other contexts via SCP when CiscoSSH is enabled. Attackers can read, create, or overwrite sensitive files in other contexts including admin and system contexts. Only affects Cisco ASA devices running in multi-context mode with CiscoSSH enabled.

💻 Affected Systems

Products:
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Versions: Multiple versions when running in multi-context mode
Operating Systems: Cisco ASA OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when running in multi-context mode with CiscoSSH stack enabled. Single-context mode is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin credentials in a non-admin context could overwrite configuration files in admin/system contexts, potentially gaining full control of the firewall or exfiltrating sensitive configuration data.

🟠

Likely Case

Privileged attacker in one context reads or modifies configuration files in another context, potentially escalating privileges or disrupting specific services.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized file access within the same administrative trust boundary.

🌐 Internet-Facing: LOW - Requires authenticated local access with administrative privileges.
🏢 Internal Only: HIGH - Internal attackers with administrative access to any context can potentially compromise other contexts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires valid administrative credentials for a non-admin context and knowledge of exact file paths in target contexts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-scpcxt-filecpy-rgeP73nE

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions. 2. Upgrade to fixed version. 3. Restart ASA device. 4. Verify fix by testing SCP operations between contexts.

🔧 Temporary Workarounds

Disable CiscoSSH

cisco-asa

Disable the CiscoSSH stack to prevent exploitation via SCP

no ssh scopy enable

Restrict administrative access

all

Limit administrative access to trusted personnel only

🧯 If You Can't Patch

  • Disable CiscoSSH stack if not required
  • Implement strict access controls and monitor for unusual SCP activity between contexts

🔍 How to Verify

Check if Vulnerable:

Check if device is in multi-context mode and CiscoSSH is enabled: 'show running-config | include ssh scopy'

Check Version:

show version | include Version

Verify Fix Applied:

After patching, verify SCP operations are properly restricted between contexts

📡 Detection & Monitoring

Log Indicators:

  • Unusual SCP copy operations between different contexts
  • Failed SCP attempts targeting other contexts

Network Indicators:

  • SCP traffic between contexts from non-admin sources

SIEM Query:

source="asa" AND (event_type="ssh" OR protocol="scp") AND (src_context!=dst_context)

🔗 References

📤 Share & Export