Vulnerabilites related to cisco - secure_firewall_management_center
cve-2017-12221
Vulnerability from cvelistv5
Published
2017-09-07 21:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100640 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.741Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", }, { name: "100640", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100640", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-09-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-08T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", }, { name: "100640", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100640", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12221", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", }, { name: "100640", refsource: "BID", url: "http://www.securityfocus.com/bid/100640", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12221", datePublished: "2017-09-07T21:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-08-05T18:28:16.741Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1981
Vulnerability from cvelistv5
Published
2019-11-05 19:35
Modified
2024-11-19 18:52
Severity ?
EPSS score ?
Summary
A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:52.366Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1981", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:28.026981Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:52:01.647Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-05T19:35:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null", }, ], source: { advisory: "cisco-sa-20190816-ftd-null", defect: [ [ "CSCvq39915", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-16T16:00:00-0700", ID: "CVE-2019-1981", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190816 Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null", }, ], }, source: { advisory: "cisco-sa-20190816-ftd-null", defect: [ [ "CSCvq39915", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1981", datePublished: "2019-11-05T19:35:41.940103Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T18:52:01.647Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20744
Vulnerability from cvelistv5
Published
2022-05-03 03:20
Modified
2024-11-06 16:17
Severity ?
EPSS score ?
Summary
A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.811Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20744", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:32.959124Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:17:47.846Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-807", description: "CWE-807", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:20:10", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu", }, ], source: { advisory: "cisco-sa-fmc-infdisc-guJWRwQu", defect: [ [ "CSCvt35116", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Information Disclosure Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20744", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Information Disclosure Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-807", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center Software Information Disclosure Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu", }, ], }, source: { advisory: "cisco-sa-fmc-infdisc-guJWRwQu", defect: [ [ "CSCvt35116", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20744", datePublished: "2022-05-03T03:20:10.556439Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:17:47.846Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20300
Vulnerability from cvelistv5
Published
2024-10-23 17:08
Modified
2024-10-24 17:48
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.7.0 Version: 6.4.0.11 Version: 6.6.3 Version: 6.7.0.1 Version: 6.6.4 Version: 6.4.0.12 Version: 6.7.0.2 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 6.7.0.3 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.4.1.1 Version: 6.6.7.2 Version: 7.2.5.2 Version: 7.3.1.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20300", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:40:00.405040Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:48:34.738Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:08:24.248Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwi23477", ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20300", datePublished: "2024-10-23T17:08:24.248Z", dateReserved: "2023-11-08T15:08:07.630Z", dateUpdated: "2024-10-24T17:48:34.738Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1477
Vulnerability from cvelistv5
Published
2021-04-29 17:30
Modified
2024-11-08 23:23
Severity ?
EPSS score ?
Summary
A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.337Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Policy Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1477", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:44:41.168801Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:23:22.510Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T17:30:59", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Policy Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC", }, ], source: { advisory: "cisco-sa-fmc-iac-pZDMQ4wC", defect: [ [ "CSCvu91097", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Policy Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-28T16:00:00", ID: "CVE-2021-1477", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Policy Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.3", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20210428 Cisco Firepower Management Center Software Policy Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC", }, ], }, source: { advisory: "cisco-sa-fmc-iac-pZDMQ4wC", defect: [ [ "CSCvu91097", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1477", datePublished: "2021-04-29T17:30:59.957878Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:23:22.510Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1458
Vulnerability from cvelistv5
Published
2016-08-18 19:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/92512 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:55:14.700Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "92512", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92512", }, { name: "20160817 Cisco Firepower Management Center Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-17T00:00:00", descriptions: [ { lang: "en", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "92512", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92512", }, { name: "20160817 Cisco Firepower Management Center Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-1458", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "92512", refsource: "BID", url: "http://www.securityfocus.com/bid/92512", }, { name: "20160817 Cisco Firepower Management Center Privilege Escalation Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-1458", datePublished: "2016-08-18T19:00:00", dateReserved: "2016-01-04T00:00:00", dateUpdated: "2024-08-05T22:55:14.700Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20114
Vulnerability from cvelistv5
Published
2023-11-01 16:43
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.919Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-file-download-7js4ug2J", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-73", description: "External Control of File Name or Path", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:45.849Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-file-download-7js4ug2J", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J", }, ], source: { advisory: "cisco-sa-fmc-file-download-7js4ug2J", defects: [ "CSCwe11263", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20114", datePublished: "2023-11-01T16:43:43.745Z", dateReserved: "2022-10-27T18:47:50.344Z", dateUpdated: "2024-08-02T08:57:35.919Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20409
Vulnerability from cvelistv5
Published
2024-10-23 17:38
Modified
2024-10-24 17:46
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 Version: 7.4.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20409", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:47.027719Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:46:51.825Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.4.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:38:10.132Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwj77284", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20409", datePublished: "2024-10-23T17:38:10.132Z", dateReserved: "2023-11-08T15:08:07.661Z", dateUpdated: "2024-10-24T17:46:51.825Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1671
Vulnerability from cvelistv5
Published
2019-02-07 22:00
Modified
2024-11-21 19:46
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106927 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.0 Version: 6.1 Version: 6.2 Version: 6.3 Version: 6.4 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:20:28.490Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106927", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106927", }, { name: "20190206 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1671", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T19:00:38.944250Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:46:00.770Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.0", }, { status: "affected", version: "6.1", }, { status: "affected", version: "6.2", }, { status: "affected", version: "6.3", }, { status: "affected", version: "6.4", }, ], }, ], datePublic: "2019-02-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-02-09T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "106927", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106927", }, { name: "20190206 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss", }, ], source: { advisory: "cisco-sa-20190206-fmc-xss", defect: [ [ "CSCvn05797", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-02-06T16:00:00-0800", ID: "CVE-2019-1671", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "6.0", }, { version_value: "6.1", }, { version_value: "6.2", }, { version_value: "6.3", }, { version_value: "6.4", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "106927", refsource: "BID", url: "http://www.securityfocus.com/bid/106927", }, { name: "20190206 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss", }, ], }, source: { advisory: "cisco-sa-20190206-fmc-xss", defect: [ [ "CSCvn05797", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1671", datePublished: "2019-02-07T22:00:00Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:46:00.770Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12681
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.271Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12681", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:31.216873Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:08:23.744Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12681", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12681", datePublished: "2019-10-02T19:06:41.439698Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:08:23.744Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20935
Vulnerability from cvelistv5
Published
2022-11-10 17:42
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:58.034Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:16.496Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb01976", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20935", datePublished: "2022-11-10T17:42:11.905Z", dateReserved: "2021-11-02T13:28:29.192Z", dateUpdated: "2024-08-03T02:31:58.034Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20854
Vulnerability from cvelistv5
Published
2022-11-10 17:31
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Firepower Management Center |
Version: N/A |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.053Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-dos-OwEunWJN", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "Uncontrolled Resource Consumption", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:11.243Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-dos-OwEunWJN", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN", }, ], source: { advisory: "cisco-sa-fmc-dos-OwEunWJN", defects: [ "CSCvy95520", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20854", datePublished: "2022-11-10T17:31:14.744Z", dateReserved: "2021-11-02T13:28:29.180Z", dateUpdated: "2024-08-03T02:24:50.053Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1431
Vulnerability from cvelistv5
Published
2016-06-18 01:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCur25516.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:55:14.631Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160617 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-17T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCur25516.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-06-18T01:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20160617 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-1431", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCur25516.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160617 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-1431", datePublished: "2016-06-18T01:00:00", dateReserved: "2016-01-04T00:00:00", dateUpdated: "2024-08-05T22:55:14.631Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0281
Vulnerability from cvelistv5
Published
2018-05-02 22:00
Modified
2024-11-29 15:11
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of a Transport Layer Security (TLS) extension during TLS connection setup for the affected software. An attacker could exploit this vulnerability by sending a crafted TLS connection setup request to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg97808.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104096 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software |
Version: Cisco Firepower System Software |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:14.998Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104096", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104096", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0281", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:44:11.105225Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T15:11:36.599Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower System Software", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software", }, ], }, ], datePublic: "2018-05-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of a Transport Layer Security (TLS) extension during TLS connection setup for the affected software. An attacker could exploit this vulnerability by sending a crafted TLS connection setup request to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg97808.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-310", description: "CWE-310", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-08T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104096", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104096", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0281", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software", version: { version_data: [ { version_value: "Cisco Firepower System Software", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of a Transport Layer Security (TLS) extension during TLS connection setup for the affected software. An attacker could exploit this vulnerability by sending a crafted TLS connection setup request to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg97808.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-310", }, ], }, ], }, references: { reference_data: [ { name: "104096", refsource: "BID", url: "http://www.securityfocus.com/bid/104096", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0281", datePublished: "2018-05-02T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T15:11:36.599Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3313
Vulnerability from cvelistv5
Published
2020-05-06 16:40
Modified
2024-11-15 17:26
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.821Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3313", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:21:47.343624Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:26:42.129Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:40:37", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k", }, ], source: { advisory: "cisco-sa-fmcxss-UT3bMx9k", defect: [ [ "CSCvh20060", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3313", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.5", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k", }, ], }, source: { advisory: "cisco-sa-fmcxss-UT3bMx9k", defect: [ [ "CSCvh20060", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3313", datePublished: "2020-05-06T16:40:37.390032Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:26:42.129Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1457
Vulnerability from cvelistv5
Published
2021-04-29 17:30
Modified
2024-11-08 23:23
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.201Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1457", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:44:58.664936Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:23:56.079Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T17:30:46", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-28T16:00:00", ID: "CVE-2021-1457", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], }, source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1457", datePublished: "2021-04-29T17:30:47.071401Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:23:56.079Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0283
Vulnerability from cvelistv5
Published
2018-05-02 22:00
Modified
2024-11-29 15:11
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104121 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software |
Version: Cisco Firepower System Software |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.452Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104121", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104121", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0283", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:44:09.933710Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T15:11:25.011Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower System Software", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software", }, ], }, ], datePublic: "2018-05-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-310", description: "CWE-310", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-10T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104121", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104121", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0283", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software", version: { version_data: [ { version_value: "Cisco Firepower System Software", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-310", }, ], }, ], }, references: { reference_data: [ { name: "104121", refsource: "BID", url: "http://www.securityfocus.com/bid/104121", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0283", datePublished: "2018-05-02T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T15:11:25.011Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1239
Vulnerability from cvelistv5
Published
2021-01-13 21:17
Modified
2024-11-12 20:47
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.395Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1239", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:54:58.794079Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:47:56.703Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T21:17:18", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], source: { advisory: "cisco-sa-fmc-stored-xss-djKfCzf2", defect: [ [ "CSCvt48601", "CSCvt99020", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-01-13T16:00:00", ID: "CVE-2021-1239", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], }, source: { advisory: "cisco-sa-fmc-stored-xss-djKfCzf2", defect: [ [ "CSCvt48601", "CSCvt99020", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1239", datePublished: "2021-01-13T21:17:18.520036Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:47:56.703Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20835
Vulnerability from cvelistv5
Published
2022-11-10 17:39
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.988Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:09.096Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb02020", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20835", datePublished: "2022-11-10T17:39:26.633Z", dateReserved: "2021-11-02T13:28:29.178Z", dateUpdated: "2024-08-03T02:24:49.988Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20918
Vulnerability from cvelistv5
Published
2022-11-10 17:29
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential.
This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential.
This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Firepower Management Center |
Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:57.397Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, ], }, { product: "Cisco FirePOWER Services Software for ASA", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential.\r\n\r This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential.\r\n\r This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "Improper Access Control", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:13.186Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", }, ], source: { advisory: "cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", defects: [ "CSCwa97541", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20918", datePublished: "2022-11-10T17:29:53.489Z", dateReserved: "2021-11-02T13:28:29.189Z", dateUpdated: "2024-08-03T02:31:57.397Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0370
Vulnerability from cvelistv5
Published
2018-07-16 17:00
Modified
2024-11-29 14:54
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing. The vulnerability is due to improper handling of traffic when the Secure Sockets Layer (SSL) inspection policy is enabled. An attacker could exploit this vulnerability by sending malicious traffic through an affected device. An exploit could allow the attacker to increase the resource consumption of a single instance of the Snort detection engine on an affected device. This will lead to performance degradation and eventually the restart of the affected Snort process. Cisco Bug IDs: CSCvi09219, CSCvi29845.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104728 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower unknown |
Version: Cisco Firepower unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.511Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", }, { name: "104728", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104728", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0370", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:34.603491Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:54:27.259Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower unknown", }, ], }, ], datePublic: "2018-07-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing. The vulnerability is due to improper handling of traffic when the Secure Sockets Layer (SSL) inspection policy is enabled. An attacker could exploit this vulnerability by sending malicious traffic through an affected device. An exploit could allow the attacker to increase the resource consumption of a single instance of the Snort detection engine on an affected device. This will lead to performance degradation and eventually the restart of the affected Snort process. Cisco Bug IDs: CSCvi09219, CSCvi29845.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-17T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", }, { name: "104728", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104728", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0370", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower unknown", version: { version_data: [ { version_value: "Cisco Firepower unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing. The vulnerability is due to improper handling of traffic when the Secure Sockets Layer (SSL) inspection policy is enabled. An attacker could exploit this vulnerability by sending malicious traffic through an affected device. An exploit could allow the attacker to increase the resource consumption of a single instance of the Snort detection engine on an affected device. This will lead to performance degradation and eventually the restart of the affected Snort process. Cisco Bug IDs: CSCvi09219, CSCvi29845.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", }, { name: "104728", refsource: "BID", url: "http://www.securityfocus.com/bid/104728", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0370", datePublished: "2018-07-16T17:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:54:27.259Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1457
Vulnerability from cvelistv5
Published
2016-08-18 19:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1036642 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/92509 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:55:14.673Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1036642", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036642", }, { name: "20160817 Cisco Firepower Management Center Remote Command Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc", }, { name: "92509", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92509", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-17T00:00:00", descriptions: [ { lang: "en", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-15T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "1036642", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036642", }, { name: "20160817 Cisco Firepower Management Center Remote Command Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc", }, { name: "92509", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92509", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-1457", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1036642", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036642", }, { name: "20160817 Cisco Firepower Management Center Remote Command Execution Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc", }, { name: "92509", refsource: "BID", url: "http://www.securityfocus.com/bid/92509", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-1457", datePublished: "2016-08-18T19:00:00", dateReserved: "2016-01-04T00:00:00", dateUpdated: "2024-08-05T22:55:14.673Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6368
Vulnerability from cvelistv5
Published
2017-04-20 22:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98292 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/bid/97932 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Detection Engine |
Version: Cisco Firepower Detection Engine |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:19.447Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", }, { name: "98292", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98292", }, { name: "97932", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/97932", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Detection Engine", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Detection Engine", }, ], }, ], datePublic: "2017-04-20T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-05T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", }, { name: "98292", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98292", }, { name: "97932", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/97932", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6368", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Detection Engine", version: { version_data: [ { version_value: "Cisco Firepower Detection Engine", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", }, { name: "98292", refsource: "BID", url: "http://www.securityfocus.com/bid/98292", }, { name: "97932", refsource: "BID", url: "http://www.securityfocus.com/bid/97932", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6368", datePublished: "2017-04-20T22:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:19.447Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-3885
Vulnerability from cvelistv5
Published
2017-04-07 17:00
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/97451 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Detection Engine |
Version: Cisco Firepower Detection Engine |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:39:41.142Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "97451", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/97451", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Detection Engine", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Detection Engine", }, ], }, ], datePublic: "2017-04-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-04-10T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "97451", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/97451", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-3885", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Detection Engine", version: { version_data: [ { version_value: "Cisco Firepower Detection Engine", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "97451", refsource: "BID", url: "http://www.securityfocus.com/bid/97451", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-3885", datePublished: "2017-04-07T17:00:00", dateReserved: "2016-12-21T00:00:00", dateUpdated: "2024-08-05T14:39:41.142Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3515
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:49
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.667Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3515", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:22:50.537019Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:49:53.850Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:44", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], source: { advisory: "cisco-sa-fmc-xss-6VqH4rpZ", defect: [ [ "CSCuw95798", "CSCvt35053", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3515", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], }, source: { advisory: "cisco-sa-fmc-xss-6VqH4rpZ", defect: [ [ "CSCuw95798", "CSCvt35053", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3515", datePublished: "2020-10-21T18:35:45.018567Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:49:53.850Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20386
Vulnerability from cvelistv5
Published
2024-10-23 17:33
Modified
2024-10-24 17:47
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20386", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:51.098498Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:47:24.943Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:33:02.801Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwj19632", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20386", datePublished: "2024-10-23T17:33:02.801Z", dateReserved: "2023-11-08T15:08:07.658Z", dateUpdated: "2024-10-24T17:47:24.943Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12688
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.182Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12688", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:16.951590Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:21.920Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:44", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], source: { advisory: "cisco-sa-20191002-fmc-rce", defect: [ [ "CSCvf87540", "CSCvg04183", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Remote Code Execution Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12688", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Remote Code Execution Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-rce", defect: [ [ "CSCvf87540", "CSCvg04183", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12688", datePublished: "2019-10-02T19:06:44.622787Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:21.920Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20219
Vulnerability from cvelistv5
Published
2023-11-01 17:08
Modified
2024-10-24 17:40
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The attacker would need valid device credentials but does not require administrator privileges to exploit this vulnerability. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device including the underlying operating system which could also affect the availability of the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-20219", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-05-31T04:00:10.303755Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:40:16.603Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.069Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-cmdinj-bTEgufOX", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The attacker would need valid device credentials but does not require administrator privileges to exploit this vulnerability. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device including the underlying operating system which could also affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:58:23.059Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmdinj-bTEgufOX", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], source: { advisory: "cisco-sa-fmc-cmdinj-bTEgufOX", defects: [ "CSCwf63210", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20219", datePublished: "2023-11-01T17:08:57.039Z", dateReserved: "2022-10-27T18:47:50.368Z", dateUpdated: "2024-10-24T17:40:16.603Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3499
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:49
Severity ?
EPSS score ?
Summary
A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.319Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3499", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:12:25.494646Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:49:34.707Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:54", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA", }, ], source: { advisory: "cisco-sa-ftdfmc-dos-NjYvDcLA", defect: [ [ "CSCvq11282", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3499", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA", }, ], }, source: { advisory: "cisco-sa-ftdfmc-dos-NjYvDcLA", defect: [ [ "CSCvq11282", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3499", datePublished: "2020-10-21T18:35:54.996131Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:49:34.707Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12690
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12690", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:14.123038Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:07.937Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:45", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-com-inj", defect: [ [ "CSCvh03962", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Command Injection Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12690", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Command Injection Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.2", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-78", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Command Injection Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-com-inj", defect: [ [ "CSCvh03962", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12690", datePublished: "2019-10-02T19:06:45.492396Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:07.937Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-40114
Vulnerability from cvelistv5
Published
2021-10-27 18:56
Modified
2024-11-07 21:43
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU | vendor-advisory | |
https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html | mailing-list | |
https://www.debian.org/security/2023/dsa-5354 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:27:31.905Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20211027 Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-40114", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:39:43.541348Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:43:47.611Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-10-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20211027 Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-snort-dos-s2R7W9UU", defect: [ [ "CSCvt57503", "CSCvx29001", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-40114", datePublished: "2021-10-27T18:56:37.380285Z", dateReserved: "2021-08-25T00:00:00", dateUpdated: "2024-11-07T21:43:47.611Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20155
Vulnerability from cvelistv5
Published
2023-11-01 16:48
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:34.875Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-logview-dos-AYJdeX55", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "Allocation of Resources Without Limits or Throttling", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:48.358Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-logview-dos-AYJdeX55", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55", }, ], source: { advisory: "cisco-sa-fmc-logview-dos-AYJdeX55", defects: [ "CSCwe51893", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20155", datePublished: "2023-11-01T16:48:10.250Z", dateReserved: "2022-10-27T18:47:50.359Z", dateUpdated: "2024-08-02T09:05:34.875Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20063
Vulnerability from cvelistv5
Published
2023-11-01 17:11
Modified
2024-10-23 19:40
Severity ?
EPSS score ?
Summary
A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.7.0 Version: 6.4.0.11 Version: 6.6.3 Version: 6.7.0.1 Version: 6.6.4 Version: 6.4.0.12 Version: 6.7.0.2 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 6.7.0.3 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.2.8.1 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.628Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-ftd-fmc-code-inj-wSHrgz8L", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20063", options: [ { Exploitation: "None", }, { Automatable: "No", }, { "Technical Impact": "Total", }, ], role: "CISA Coordinator", timestamp: "2023-11-15T16:39:52.764967Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T19:40:26.769Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, ], }, { defaultStatus: "unknown", product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:06:37.547Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-ftd-fmc-code-inj-wSHrgz8L", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L", }, ], source: { advisory: "cisco-sa-ftd-fmc-code-inj-wSHrgz8L", defects: [ "CSCwb42031", ], discovery: "INTERNAL", }, title: "Cisco Cisco Firepower Threat Defense Software and Cisco Firepower Management Center Code Injection Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20063", datePublished: "2023-11-01T17:11:46.268Z", dateReserved: "2022-10-27T18:47:50.321Z", dateUpdated: "2024-10-23T19:40:26.769Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3315
Vulnerability from cvelistv5
Published
2020-05-06 16:40
Modified
2024-11-15 17:26
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.819Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3315", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:21:45.962425Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:26:32.026Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-snort_filepolbypass-m4X5DgOP", defect: [ [ "CSCvr01675", "CSCvr82603", "CSCvt10151", "CSCvt28138", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3315", datePublished: "2020-05-06T16:40:42.180942Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:26:32.026Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1236
Vulnerability from cvelistv5
Published
2021-01-13 21:17
Modified
2024-11-12 20:48
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.434Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1236", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:55:08.338945Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:48:23.581Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-670", description: "CWE-670", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-snort-app-bypass-cSBYCATq", defect: [ [ "CSCvs85467", "CSCvu21318", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1236", datePublished: "2021-01-13T21:17:03.406091Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:48:23.581Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20628
Vulnerability from cvelistv5
Published
2022-05-03 03:16
Modified
2024-11-06 16:18
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:17:52.987Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20628", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:35.384011Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:18:13.131Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:16:39", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20628", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.4", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], }, source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20628", datePublished: "2022-05-03T03:16:39.517948Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:18:13.131Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20836
Vulnerability from cvelistv5
Published
2022-11-10 17:40
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.957Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:09.470Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb02026", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20836", datePublished: "2022-11-10T17:40:11.652Z", dateReserved: "2021-11-02T13:28:29.178Z", dateUpdated: "2024-08-03T02:24:49.957Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-3809
Vulnerability from cvelistv5
Published
2017-02-03 07:24
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base. More Information: CSCvb95281. Known Affected Releases: 6.1.0 6.2.0. Known Fixed Releases: 6.1.0.1 6.2.0.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1037776 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/95941 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center (FMC) 6.1.0 6.2.0 |
Version: Cisco Firepower Management Center (FMC) 6.1.0 6.2.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:39:40.560Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1037776", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037776", }, { name: "95941", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95941", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center (FMC) 6.1.0 6.2.0", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center (FMC) 6.1.0 6.2.0", }, ], }, ], datePublic: "2017-02-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base. More Information: CSCvb95281. Known Affected Releases: 6.1.0 6.2.0. Known Fixed Releases: 6.1.0.1 6.2.0.", }, ], problemTypes: [ { descriptions: [ { description: "prevent deployment of a complete and accurate rule base", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-24T12:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "1037776", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037776", }, { name: "95941", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95941", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-3809", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center (FMC) 6.1.0 6.2.0", version: { version_data: [ { version_value: "Cisco Firepower Management Center (FMC) 6.1.0 6.2.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base. More Information: CSCvb95281. Known Affected Releases: 6.1.0 6.2.0. Known Fixed Releases: 6.1.0.1 6.2.0.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "prevent deployment of a complete and accurate rule base", }, ], }, ], }, references: { reference_data: [ { name: "1037776", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037776", }, { name: "95941", refsource: "BID", url: "http://www.securityfocus.com/bid/95941", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-3809", datePublished: "2017-02-03T07:24:00", dateReserved: "2016-12-21T00:00:00", dateUpdated: "2024-08-05T14:39:40.560Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6673
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 15:33
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco Firepower Management Center could allow an authenticated, remote attacker to obtain user information. An attacker could use this information to perform reconnaissance. More Information: CSCvc10894. Known Affected Releases: 6.1.0.2 6.2.0. Known Fixed Releases: 6.2.0.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:33:20.447Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-06-13T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in Cisco Firepower Management Center could allow an authenticated, remote attacker to obtain user information. An attacker could use this information to perform reconnaissance. More Information: CSCvc10894. Known Affected Releases: 6.1.0.2 6.2.0. Known Fixed Releases: 6.2.0.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-13T05:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-6673", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in Cisco Firepower Management Center could allow an authenticated, remote attacker to obtain user information. An attacker could use this information to perform reconnaissance. More Information: CSCvc10894. Known Affected Releases: 6.1.0.2 6.2.0. Known Fixed Releases: 6.2.0.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-6673", datePublished: "2017-06-13T06:00:00", dateReserved: "2017-03-09T00:00:00", dateUpdated: "2024-08-05T15:33:20.447Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20472
Vulnerability from cvelistv5
Published
2024-10-23 17:50
Modified
2024-10-23 21:00
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20472", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T20:59:33.004098Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T21:00:40.915Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:50:13.687Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-sql-inj-LOYAFcfq", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], source: { advisory: "cisco-sa-fmc-sql-inj-LOYAFcfq", defects: [ "CSCwi78598", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20472", datePublished: "2024-10-23T17:50:13.687Z", dateReserved: "2023-11-08T15:08:07.681Z", dateUpdated: "2024-10-23T21:00:40.915Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12685
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.194Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12685", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:21.981630Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:44.815Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:43", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12685", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12685", datePublished: "2019-10-02T19:06:43.320551Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:44.815Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3549
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:50
Severity ?
EPSS score ?
Summary
A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.873Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3549", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:17:28.775527Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:50:32.254Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-326", description: "CWE-326", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:24", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", }, ], source: { advisory: "cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", defect: [ [ "CSCvp56719", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3549", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-326", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", }, ], }, source: { advisory: "cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", defect: [ [ "CSCvp56719", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3549", datePublished: "2020-10-21T18:35:24.890607Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:50:32.254Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20838
Vulnerability from cvelistv5
Published
2022-11-10 17:40
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.933Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:09.774Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb61901", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20838", datePublished: "2022-11-10T17:40:22.087Z", dateReserved: "2021-11-02T13:28:29.178Z", dateUpdated: "2024-08-03T02:24:49.933Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12220
Vulnerability from cvelistv5
Published
2017-09-07 21:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/100639 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.729Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "100639", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100639", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-09-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-08T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "100639", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100639", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12220", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "100639", refsource: "BID", url: "http://www.securityfocus.com/bid/100639", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12220", datePublished: "2017-09-07T21:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-08-05T18:28:16.729Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20832
Vulnerability from cvelistv5
Published
2022-11-10 17:38
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.954Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:08.097Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb01990", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20832", datePublished: "2022-11-10T17:38:38.713Z", dateReserved: "2021-11-02T13:28:29.177Z", dateUpdated: "2024-08-03T02:24:49.954Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20424
Vulnerability from cvelistv5
Published
2024-10-23 17:46
Modified
2024-10-26 03:55
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system as root.
This vulnerability is due to insufficient input validation of certain HTTP requests. An attacker could exploit this vulnerability by authenticating to the web-based management interface of an affected device and then sending a crafted HTTP request to the device. A successful exploit could allow the attacker to execute arbitrary commands with root permissions on the underlying operating system of the Cisco FMC device or to execute commands on managed Cisco Firepower Threat Defense (FTD) devices. To exploit this vulnerability, the attacker would need valid credentials for a user account with at least the role of Security Analyst (Read Only).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 Version: 7.4.2 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.4.2", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20424", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-26T03:55:25.923Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.4.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system as root.\r\n\r This vulnerability is due to insufficient input validation of certain HTTP requests. An attacker could exploit this vulnerability by authenticating to the web-based management interface of an affected device and then sending a crafted HTTP request to the device. A successful exploit could allow the attacker to execute arbitrary commands with root permissions on the underlying operating system of the Cisco FMC device or to execute commands on managed Cisco Firepower Threat Defense (FTD) devices. To exploit this vulnerability, the attacker would need valid credentials for a user account with at least the role of Security Analyst (Read Only).", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:46:24.274Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmd-inj-v3AWDqN7", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7", }, ], source: { advisory: "cisco-sa-fmc-cmd-inj-v3AWDqN7", defects: [ "CSCwj68540", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20424", datePublished: "2024-10-23T17:46:24.274Z", dateReserved: "2023-11-08T15:08:07.666Z", dateUpdated: "2024-10-26T03:55:25.923Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20041
Vulnerability from cvelistv5
Published
2023-11-01 16:52
Modified
2024-11-21 21:44
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.4.0.16 Version: 6.6.7.1 Version: 7.0.5 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.535Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20041", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-01-30T15:26:05.780529Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T21:44:10.797Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:36.413Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], source: { advisory: "cisco-sa-fmc-xss-sK2gkfvJ", defects: [ "CSCwc76700", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20041", datePublished: "2023-11-01T16:52:04.441Z", dateReserved: "2022-10-27T18:47:50.316Z", dateUpdated: "2024-11-21T21:44:10.797Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1455
Vulnerability from cvelistv5
Published
2021-04-29 17:30
Modified
2024-11-08 23:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.284Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1455", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:45:04.400944Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:24:20.086Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T17:30:38", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-28T16:00:00", ID: "CVE-2021-1455", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], }, source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1455", datePublished: "2021-04-29T17:30:38.279961Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:24:20.086Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-15397
Vulnerability from cvelistv5
Published
2018-10-05 14:00
Modified
2024-11-26 14:33
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1041786 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:54:03.022Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20181003 Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos", }, { name: "1041786", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041786", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-15397", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-25T18:48:08.483364Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-26T14:33:04.155Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Adaptive Security Appliance (ASA) Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-10-03T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-320", description: "CWE-320", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-07T09:57:02", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20181003 Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos", }, { name: "1041786", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041786", }, ], source: { advisory: "cisco-sa-20181003-asa-ipsec-dos", defect: [ [ "CSCuy57310", ], ], discovery: "UNKNOWN", }, title: "Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2018-10-03T16:00:00-0500", ID: "CVE-2018-15397", STATE: "PUBLIC", TITLE: "Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Adaptive Security Appliance (ASA) Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.", }, ], }, impact: { cvss: { baseScore: "6.8", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-320", }, ], }, ], }, references: { reference_data: [ { name: "20181003 Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos", }, { name: "1041786", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041786", }, ], }, source: { advisory: "cisco-sa-20181003-asa-ipsec-dos", defect: [ [ "CSCuy57310", ], ], discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-15397", datePublished: "2018-10-05T14:00:00Z", dateReserved: "2018-08-17T00:00:00", dateUpdated: "2024-11-26T14:33:04.155Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1223
Vulnerability from cvelistv5
Published
2021-01-13 21:16
Modified
2024-11-12 20:48
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.174Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1223", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:06:16.123523Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:48:44.825Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-snort-filepolbypass-67DEwMe2", defect: [ [ "CSCvs71969", "CSCvu18635", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1223", datePublished: "2021-01-13T21:16:48.777971Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:48:44.825Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6433
Vulnerability from cvelistv5
Published
2016-10-06 10:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.
References
▼ | URL | Tags |
---|---|---|
https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt | x_refsource_MISC | |
http://www.securityfocus.com/bid/93414 | vdb-entry, x_refsource_BID | |
https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking | x_refsource_MISC | |
https://www.exploit-db.com/exploits/40463/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.exploit-db.com/exploits/41041/ | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html | x_refsource_MISC | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:20.060Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", }, { name: "93414", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93414", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "40463", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/40463/", }, { name: "41041", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/41041/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", }, { name: "20161005 Cisco Firepower Threat Management Console Remote Command Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-10-05T00:00:00", descriptions: [ { lang: "en", value: "The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-02T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", }, { name: "93414", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93414", }, { tags: [ "x_refsource_MISC", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "40463", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/40463/", }, { name: "41041", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/41041/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", }, { name: "20161005 Cisco Firepower Threat Management Console Remote Command Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6433", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", refsource: "MISC", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", }, { name: "93414", refsource: "BID", url: "http://www.securityfocus.com/bid/93414", }, { name: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", refsource: "MISC", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "40463", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/40463/", }, { name: "41041", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/41041/", }, { name: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", }, { name: "20161005 Cisco Firepower Threat Management Console Remote Command Execution Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6433", datePublished: "2016-10-06T10:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:20.060Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20843
Vulnerability from cvelistv5
Published
2022-11-10 17:41
Modified
2024-10-25 16:04
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.951Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20843", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:47.230310Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:04:31.397Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:10.943Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwa64739", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20843", datePublished: "2022-11-10T17:41:15.609Z", dateReserved: "2021-11-02T13:28:29.179Z", dateUpdated: "2024-10-25T16:04:31.397Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20925
Vulnerability from cvelistv5
Published
2022-11-10 17:36
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:58.496Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-cmd-inj-Z3B5MY35", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:14.177Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmd-inj-Z3B5MY35", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], source: { advisory: "cisco-sa-fmc-cmd-inj-Z3B5MY35", defects: [ "CSCwb23029", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20925", datePublished: "2022-11-10T17:36:10.306Z", dateReserved: "2021-11-02T13:28:29.191Z", dateUpdated: "2024-08-03T02:31:58.496Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3302
Vulnerability from cvelistv5
Published
2020-05-06 16:42
Modified
2024-11-15 17:23
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.928Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center File Overwrite Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3302", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:28:37.513085Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:23:12.091Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:42:16", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center File Overwrite Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN", }, ], source: { advisory: "cisco-sa-fmcai-z5dQObVN", defect: [ [ "CSCvh03970", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center File Overwrite Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3302", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center File Overwrite Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.8", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center File Overwrite Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN", }, ], }, source: { advisory: "cisco-sa-fmcai-z5dQObVN", defect: [ [ "CSCvh03970", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3302", datePublished: "2020-05-06T16:42:16.657928Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:23:12.091Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12244
Vulnerability from cvelistv5
Published
2017-10-05 07:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort process restarts unexpectedly. The vulnerability is due to improper input validation of the fields in the IPv6 extension header packet. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability is specific to IPv6 traffic only. This vulnerability affects Cisco Firepower System Software Releases 6.0 and later when the software has one or more file action policies configured and is running on any of the following Cisco products: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Cisco Bug IDs: CSCvd34776.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101119 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Detection Engine |
Version: Cisco Firepower Detection Engine |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.741Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "101119", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101119", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Detection Engine", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Detection Engine", }, ], }, ], datePublic: "2017-10-05T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort process restarts unexpectedly. The vulnerability is due to improper input validation of the fields in the IPv6 extension header packet. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability is specific to IPv6 traffic only. This vulnerability affects Cisco Firepower System Software Releases 6.0 and later when the software has one or more file action policies configured and is running on any of the following Cisco products: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Cisco Bug IDs: CSCvd34776.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-05T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "101119", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101119", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12244", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Detection Engine", version: { version_data: [ { version_value: "Cisco Firepower Detection Engine", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort process restarts unexpectedly. The vulnerability is due to improper input validation of the fields in the IPv6 extension header packet. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability is specific to IPv6 traffic only. This vulnerability affects Cisco Firepower System Software Releases 6.0 and later when the software has one or more file action policies configured and is running on any of the following Cisco products: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Cisco Bug IDs: CSCvd34776.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "101119", refsource: "BID", url: "http://www.securityfocus.com/bid/101119", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12244", datePublished: "2017-10-05T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-08-05T18:28:16.741Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1413
Vulnerability from cvelistv5
Published
2016-05-28 01:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:55:14.457Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160527 Cisco Firepower Management Center Web Interface Code Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-27T00:00:00", descriptions: [ { lang: "en", value: "The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-05-28T01:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20160527 Cisco Firepower Management Center Web Interface Code Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-1413", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160527 Cisco Firepower Management Center Web Interface Code Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-1413", datePublished: "2016-05-28T01:00:00", dateReserved: "2016-01-04T00:00:00", dateUpdated: "2024-08-05T22:55:14.457Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20839
Vulnerability from cvelistv5
Published
2022-11-10 17:40
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.958Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:10.179Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb61908", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20839", datePublished: "2022-11-10T17:40:35.365Z", dateReserved: "2021-11-02T13:28:29.179Z", dateUpdated: "2024-08-03T02:24:49.958Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20388
Vulnerability from cvelistv5
Published
2024-10-23 17:35
Modified
2024-10-24 16:24
Severity ?
EPSS score ?
Summary
A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.
This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { lessThanOrEqual: "6.2.3.18", status: "affected", version: "6.2.3", versionType: "custom", }, { lessThanOrEqual: "6.4.0.18", status: "affected", version: "6.4.0", versionType: "custom", }, { lessThanOrEqual: "6.6.7.2", status: "affected", version: "6.6.0", versionType: "custom", }, { lessThanOrEqual: "6.7.0.3", status: "affected", version: "6.7.0", versionType: "custom", }, { lessThanOrEqual: "7.0.6.2", status: "affected", version: "7.0.0", versionType: "custom", }, { lessThanOrEqual: "7.1.0.3", status: "affected", version: "7.1.0", versionType: "custom", }, { lessThanOrEqual: "7.2.8.1", status: "affected", version: "7.2.0", versionType: "custom", }, { lessThanOrEqual: "7.3.1.2", status: "affected", version: "7.3.0", versionType: "custom", }, { lessThanOrEqual: "7.4.1.1", status: "affected", version: "7.4.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_threat_defense_software", vendor: "cisco", versions: [ { lessThanOrEqual: "6.4.0.18", status: "affected", version: "6.4.0.4", versionType: "custom", }, { lessThanOrEqual: "6.6.7", status: "affected", version: "6.6.5.1", versionType: "custom", }, { status: "affected", version: "6.7.0.2", }, { lessThanOrEqual: "7.1.0.3", status: "affected", version: "7.1.0.1", versionType: "custom", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.4.1", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20388", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:45:56.491861Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T16:24:24.678Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.4.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.\r\n\r This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-202", description: "Exposure of Sensitive Information Through Data Queries", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:35:24.772Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-infodisc-RL4mJFer", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer", }, ], source: { advisory: "cisco-sa-fmc-xss-infodisc-RL4mJFer", defects: [ "CSCwj03056", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20388", datePublished: "2024-10-23T17:35:24.772Z", dateReserved: "2023-11-08T15:08:07.658Z", dateUpdated: "2024-10-24T16:24:24.678Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1709
Vulnerability from cvelistv5
Published
2019-05-03 16:10
Modified
2024-11-21 19:34
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108156 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < 6.2.3.12 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.298Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj", }, { name: "108156", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108156", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1709", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:58:56.814590Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:34:53.354Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "6.2.3.12", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-01T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-06T09:06:05", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj", }, { name: "108156", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108156", }, ], source: { advisory: "cisco-sa-20190501-frpwr-cmd-inj", defect: [ [ "CSCvm14267", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Command Injection Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-01T16:00:00-0700", ID: "CVE-2019-1709", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Command Injection Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.2.3.12", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.0", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-78", }, ], }, ], }, references: { reference_data: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj", }, { name: "108156", refsource: "BID", url: "http://www.securityfocus.com/bid/108156", }, ], }, source: { advisory: "cisco-sa-20190501-frpwr-cmd-inj", defect: [ [ "CSCvm14267", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1709", datePublished: "2019-05-03T16:10:13.500549Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:34:53.354Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1458
Vulnerability from cvelistv5
Published
2021-04-29 17:30
Modified
2024-11-08 23:23
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.354Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1458", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:44:51.199008Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:23:47.084Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T17:30:51", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-28T16:00:00", ID: "CVE-2021-1458", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], }, source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1458", datePublished: "2021-04-29T17:30:51.451910Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:23:47.084Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-40116
Vulnerability from cvelistv5
Published
2021-10-27 18:56
Modified
2024-11-07 21:45
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:27:31.552Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20211027 Multiple Cisco Products Snort Rule Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-40116", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:44:24.760230Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:45:31.681Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-10-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-241", description: "CWE-241", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-27T18:56:42", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20211027 Multiple Cisco Products Snort Rule Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM", }, ], source: { advisory: "cisco-sa-snort-dos-RywH7ezM", defect: [ [ "CSCvy66065", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort Rule Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-10-27T16:00:00", ID: "CVE-2021-40116", STATE: "PUBLIC", TITLE: "Multiple Cisco Products Snort Rule Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-241", }, ], }, ], }, references: { reference_data: [ { name: "20211027 Multiple Cisco Products Snort Rule Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM", }, ], }, source: { advisory: "cisco-sa-snort-dos-RywH7ezM", defect: [ [ "CSCvy66065", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-40116", datePublished: "2021-10-27T18:56:42.934548Z", dateReserved: "2021-08-25T00:00:00", dateUpdated: "2024-11-07T21:45:31.681Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6419
Vulnerability from cvelistv5
Published
2016-10-05 10:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/93206 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:19.985Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "93206", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93206", }, { name: "20160928 Cisco Firepower Management Center SQL Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-28T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "93206", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93206", }, { name: "20160928 Cisco Firepower Management Center SQL Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6419", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "93206", refsource: "BID", url: "http://www.securityfocus.com/bid/93206", }, { name: "20160928 Cisco Firepower Management Center SQL Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6419", datePublished: "2016-10-05T10:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:19.985Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3312
Vulnerability from cvelistv5
Published
2020-05-06 16:40
Modified
2024-11-15 17:26
Severity ?
EPSS score ?
Summary
A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.016Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Threat Defense Software Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3312", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:21:48.676937Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:26:51.732Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:40:32", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Threat Defense Software Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD", }, ], source: { advisory: "cisco-sa-ftd-infodis-kZxGtUJD", defect: [ [ "CSCvq87923", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Information Disclosure Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3312", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Information Disclosure Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Threat Defense Software Information Disclosure Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD", }, ], }, source: { advisory: "cisco-sa-ftd-infodis-kZxGtUJD", defect: [ [ "CSCvq87923", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3312", datePublished: "2020-05-06T16:40:32.460160Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:26:51.732Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1267
Vulnerability from cvelistv5
Published
2021-01-13 21:45
Modified
2024-11-12 20:39
Severity ?
EPSS score ?
Summary
A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by crafting an XML-based widget on an affected server. A successful exploit could cause increased memory and CPU utilization, which could result in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.339Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Cisco Firepower Management Center XML Entity Expansion Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1267", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:53:07.524442Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:39:53.509Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by crafting an XML-based widget on an affected server. A successful exploit could cause increased memory and CPU utilization, which could result in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-776", description: "CWE-776", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T21:45:49", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Cisco Firepower Management Center XML Entity Expansion Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs", }, ], source: { advisory: "cisco-sa-fmc-xee-DFzARDcs", defect: [ [ "CSCvt63027", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center XML Entity Expansion Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-01-13T16:00:00", ID: "CVE-2021-1267", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center XML Entity Expansion Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by crafting an XML-based widget on an affected server. A successful exploit could cause increased memory and CPU utilization, which could result in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-776", }, ], }, ], }, references: { reference_data: [ { name: "20210113 Cisco Firepower Management Center XML Entity Expansion Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs", }, ], }, source: { advisory: "cisco-sa-fmc-xee-DFzARDcs", defect: [ [ "CSCvt63027", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1267", datePublished: "2021-01-13T21:45:49.441874Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:39:53.509Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20403
Vulnerability from cvelistv5
Published
2024-10-23 17:36
Modified
2024-10-24 17:47
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 Version: 7.4.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20403", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:49.726716Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:47:15.288Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.4.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:36:14.821Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwi85823", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20403", datePublished: "2024-10-23T17:36:14.821Z", dateReserved: "2023-11-08T15:08:07.660Z", dateUpdated: "2024-10-24T17:47:15.288Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0383
Vulnerability from cvelistv5
Published
2018-07-16 17:00
Modified
2024-11-29 14:54
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic. Cisco Bug IDs: CSCvh70130.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041283 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/104726 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco FireSIGHT unknown |
Version: Cisco FireSIGHT unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.620Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", }, { name: "1041283", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041283", }, { name: "104726", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104726", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0383", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:33.327817Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:54:17.538Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco FireSIGHT unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco FireSIGHT unknown", }, ], }, ], datePublic: "2018-07-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic. Cisco Bug IDs: CSCvh70130.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-17T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", }, { name: "1041283", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041283", }, { name: "104726", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104726", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0383", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco FireSIGHT unknown", version: { version_data: [ { version_value: "Cisco FireSIGHT unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic. Cisco Bug IDs: CSCvh70130.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", }, { name: "1041283", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041283", }, { name: "104726", refsource: "BID", url: "http://www.securityfocus.com/bid/104726", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0383", datePublished: "2018-07-16T17:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:54:17.538Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12687
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.286Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12687", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:18.605254Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:28.601Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:44", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], source: { advisory: "cisco-sa-20191002-fmc-rce", defect: [ [ "CSCvf87540", "CSCvg04183", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Remote Code Execution Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12687", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Remote Code Execution Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-rce", defect: [ [ "CSCvf87540", "CSCvg04183", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12687", datePublished: "2019-10-02T19:06:44.191306Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:28.601Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12691
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-21 19:12
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.247Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Directory Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12691", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:56:44.881434Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:12:30.937Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:45", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Directory Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav", }, ], source: { advisory: "cisco-sa-20191002-fmc-dir-trav", defect: [ [ "CSCvh03967", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Directory Traversal Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12691", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Directory Traversal Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-22", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Directory Traversal Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-dir-trav", defect: [ [ "CSCvh03967", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12691", datePublished: "2019-10-02T19:06:45.927718Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-21T19:12:30.937Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3550
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:50
Severity ?
EPSS score ?
Summary
A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:55.239Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3550", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:17:30.355429Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:50:42.483Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:20", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB", }, ], source: { advisory: "cisco-sa-ftdfmc-dirtrav-NW8XcuSB", defect: [ [ "CSCvp56744", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3550", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-22", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB", }, ], }, source: { advisory: "cisco-sa-ftdfmc-dirtrav-NW8XcuSB", defect: [ [ "CSCvp56744", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3550", datePublished: "2020-10-21T18:35:20.388990Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:50:42.483Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20872
Vulnerability from cvelistv5
Published
2022-11-10 17:41
Modified
2024-11-19 21:02
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.236Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20872", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-01-29T20:58:25.296955Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T21:02:26.272Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:12.181Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb88587", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20872", datePublished: "2022-11-10T17:41:33.163Z", dateReserved: "2021-11-02T13:28:29.183Z", dateUpdated: "2024-11-19T21:02:26.272Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20048
Vulnerability from cvelistv5
Published
2023-11-01 17:04
Modified
2024-10-23 19:40
Severity ?
EPSS score ?
Summary
A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.642Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-cmd-inj-29MP49hN", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20048", options: [ { Exploitation: "None", }, { Automatable: "No", }, { "Technical Impact": "Total", }, ], role: "CISA Coordinator", timestamp: "2023-11-15T16:39:54.280874Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T19:40:39.275Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "Improper Privilege Management", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:38.670Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmd-inj-29MP49hN", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN", }, ], source: { advisory: "cisco-sa-fmc-cmd-inj-29MP49hN", defects: [ "CSCwd02925", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20048", datePublished: "2023-11-01T17:04:34.895Z", dateReserved: "2022-10-27T18:47:50.318Z", dateUpdated: "2024-10-23T19:40:39.275Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20005
Vulnerability from cvelistv5
Published
2023-11-01 16:54
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.060Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:29.098Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], source: { advisory: "cisco-sa-fmc-xss-sK2gkfvJ", defects: [ "CSCwd09231", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20005", datePublished: "2023-11-01T16:54:03.826Z", dateReserved: "2022-10-27T18:47:50.306Z", dateUpdated: "2024-08-02T08:57:35.060Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20340
Vulnerability from cvelistv5
Published
2024-10-23 17:09
Modified
2024-10-24 17:48
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.1.0 Version: 7.0.1.1 Version: 7.1.0.1 Version: 7.0.2 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 7.3.0 Version: 7.2.2 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.4.2 Version: 7.2.8.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20340", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:57.724507Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:48:12.904Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.4.2", }, { status: "affected", version: "7.2.8.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:09:10.266Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-sql-inject-2EnmTC8v", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-sql-inject-2EnmTC8v", defects: [ "CSCwi23613", ], discovery: "INTERNAL", }, title: "Cisco Secure Firewall Management Center SQL Injection Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20340", datePublished: "2024-10-23T17:09:10.266Z", dateReserved: "2023-11-08T15:08:07.642Z", dateUpdated: "2024-10-24T17:48:12.904Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1832
Vulnerability from cvelistv5
Published
2019-05-16 01:15
Modified
2024-11-19 19:07
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108340 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.865Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190515 Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass", }, { name: "108340", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108340", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1832", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:24:12.677086Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:07:11.562Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-16T09:06:04", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190515 Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass", }, { name: "108340", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108340", }, ], source: { advisory: "cisco-sa-20190515-ftdde-poly-bypass", defect: [ [ "CSCvk43854", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-15T16:00:00-0700", ID: "CVE-2019-1832", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "20190515 Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass", }, { name: "108340", refsource: "BID", url: "http://www.securityfocus.com/bid/108340", }, ], }, source: { advisory: "cisco-sa-20190515-ftdde-poly-bypass", defect: [ [ "CSCvk43854", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1832", datePublished: "2019-05-16T01:15:23.250506Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:07:11.562Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20482
Vulnerability from cvelistv5
Published
2024-10-23 17:52
Modified
2024-10-26 03:55
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker must have a valid account on the device that is configured with a custom read-only role.
This vulnerability is due to insufficient validation of role permissions in part of the web-based management interface. An attacker could exploit this vulnerability by performing a write operation on the affected part of the web-based management interface. A successful exploit could allow the attacker to modify certain parts of the configuration.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20482", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-26T03:55:29.925Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker must have a valid account on the device that is configured with a custom read-only role.\r\n\r This vulnerability is due to insufficient validation of role permissions in part of the web-based management interface. An attacker could exploit this vulnerability by performing a write operation on the affected part of the web-based management interface. A successful exploit could allow the attacker to modify certain parts of the configuration.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "Incorrect Authorization", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:52:08.555Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-priv-esc-CMQ4S6m7", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7", }, ], source: { advisory: "cisco-sa-fmc-priv-esc-CMQ4S6m7", defects: [ "CSCwj41973", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20482", datePublished: "2024-10-23T17:52:08.555Z", dateReserved: "2023-11-08T15:08:07.684Z", dateUpdated: "2024-10-26T03:55:29.925Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20905
Vulnerability from cvelistv5
Published
2022-11-10 17:41
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:57.369Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:12.496Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwc10037", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20905", datePublished: "2022-11-10T17:41:46.692Z", dateReserved: "2021-11-02T13:28:29.187Z", dateUpdated: "2024-08-03T02:31:57.369Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-3847
Vulnerability from cvelistv5
Published
2017-02-22 02:00
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96253 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center Web Framework |
Version: Cisco Firepower Management Center Web Framework |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:39:41.118Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", }, { name: "96253", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96253", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center Web Framework", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center Web Framework", }, ], }, ], datePublic: "2017-02-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.", }, ], problemTypes: [ { descriptions: [ { description: "Cross-Site Scripting Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-03-06T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", }, { name: "96253", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96253", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-3847", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center Web Framework", version: { version_data: [ { version_value: "Cisco Firepower Management Center Web Framework", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Cross-Site Scripting Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", }, { name: "96253", refsource: "BID", url: "http://www.securityfocus.com/bid/96253", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-3847", datePublished: "2017-02-22T02:00:00", dateReserved: "2016-12-21T00:00:00", dateUpdated: "2024-08-05T14:39:41.118Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1224
Vulnerability from cvelistv5
Published
2021-01-13 21:16
Modified
2024-11-12 20:48
Severity ?
EPSS score ?
Summary
Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.126Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1224", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:06:11.617988Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:48:38.628Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-snort-tfo-bypass-MmzZrtes", defect: [ [ "CSCvt43136", "CSCvu88532", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1224", datePublished: "2021-01-13T21:16:53.450812Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:48:38.628Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20387
Vulnerability from cvelistv5
Published
2024-10-23 17:34
Modified
2024-10-24 17:01
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco FMC Software could allow an authenticated, remote attacker to store malicious content for use in XSS attacks. This vulnerability is due to improper input sanitization in the web-based management interface of Cisco FMC Software. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to conduct a stored XSS attack on an affected device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20387", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-24T17:01:27.605090Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:01:38.658Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco FMC Software could allow an authenticated, remote attacker to store malicious content for use in XSS attacks. This vulnerability is due to improper input sanitization in the web-based management interface of Cisco FMC Software. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to conduct a stored XSS attack on an affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:34:18.768Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-infodisc-RL4mJFer", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer", }, ], source: { advisory: "cisco-sa-fmc-xss-infodisc-RL4mJFer", defects: [ "CSCwi99692", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20387", datePublished: "2024-10-23T17:34:18.768Z", dateReserved: "2023-11-08T15:08:07.658Z", dateUpdated: "2024-10-24T17:01:38.658Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20379
Vulnerability from cvelistv5
Published
2024-10-23 17:30
Modified
2024-10-23 19:40
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20379", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:46:31.621999Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T19:40:09.040Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-36", description: "Absolute Path Traversal", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:30:52.502Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-file-read-5q4mQRn", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn", }, ], source: { advisory: "cisco-sa-fmc-file-read-5q4mQRn", defects: [ "CSCwi78547", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20379", datePublished: "2024-10-23T17:30:52.502Z", dateReserved: "2023-11-08T15:08:07.656Z", dateUpdated: "2024-10-23T19:40:09.040Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1802
Vulnerability from cvelistv5
Published
2019-04-18 01:10
Modified
2024-11-21 19:37
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to access a report containing malicious content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions 6.2.3, 6.3.0, and 6.4.0 are affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107995 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.3.0 Version: 6.4.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.849Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190417 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss", }, { name: "107995", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107995", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1802", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:59:16.863954Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:37:37.282Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.3.0", }, { status: "affected", version: "6.4.0", }, ], }, ], datePublic: "2019-04-17T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to access a report containing malicious content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions 6.2.3, 6.3.0, and 6.4.0 are affected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-18T12:06:02", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190417 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss", }, { name: "107995", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107995", }, ], source: { advisory: "cisco-sa-20190417-cfmc-xss", defect: [ [ "CSCvn99712", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-04-17T16:00:00-0700", ID: "CVE-2019-1802", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "6.2.3", }, { version_value: "6.3.0", }, { version_value: "6.4.0", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to access a report containing malicious content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions 6.2.3, 6.3.0, and 6.4.0 are affected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20190417 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss", }, { name: "107995", refsource: "BID", url: "http://www.securityfocus.com/bid/107995", }, ], }, source: { advisory: "cisco-sa-20190417-cfmc-xss", defect: [ [ "CSCvn99712", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1802", datePublished: "2019-04-18T01:10:19.743516Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:37:37.282Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-6411
Vulnerability from cvelistv5
Published
2015-12-15 02:00
Modified
2024-08-06 07:22
Severity ?
EPSS score ?
Summary
Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/78740 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:22:21.512Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "78740", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/78740", }, { name: "20151209 Cisco FirePOWER Management Center Software Version Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-12-09T00:00:00", descriptions: [ { lang: "en", value: "Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "78740", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/78740", }, { name: "20151209 Cisco FirePOWER Management Center Software Version Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2015-6411", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "78740", refsource: "BID", url: "http://www.securityfocus.com/bid/78740", }, { name: "20151209 Cisco FirePOWER Management Center Software Version Information Disclosure Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2015-6411", datePublished: "2015-12-15T02:00:00", dateReserved: "2015-08-17T00:00:00", dateUpdated: "2024-08-06T07:22:21.512Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1642
Vulnerability from cvelistv5
Published
2019-01-23 23:00
Modified
2024-11-21 19:48
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/46263/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/106714 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:20:28.443Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "46263", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/46263/", }, { name: "106714", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106714", }, { name: "20190123 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1642", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T19:01:00.784646Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:48:06.329Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-23T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-01-29T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "46263", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/46263/", }, { name: "106714", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106714", }, { name: "20190123 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss", }, ], source: { advisory: "cisco-sa-20190123-frpwr-mc-xss", defect: [ [ "CSCvk30983", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-01-23T16:00:00-0800", ID: "CVE-2019-1642", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "46263", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46263/", }, { name: "106714", refsource: "BID", url: "http://www.securityfocus.com/bid/106714", }, { name: "20190123 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss", }, ], }, source: { advisory: "cisco-sa-20190123-frpwr-mc-xss", defect: [ [ "CSCvk30983", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1642", datePublished: "2019-01-23T23:00:00Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:48:06.329Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20298
Vulnerability from cvelistv5
Published
2024-10-23 17:08
Modified
2024-10-24 17:48
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 Version: 7.3.1.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20298", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:40:02.693917Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:48:48.927Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:08:03.318Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwi32423", ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20298", datePublished: "2024-10-23T17:08:03.318Z", dateReserved: "2023-11-08T15:08:07.629Z", dateUpdated: "2024-10-24T17:48:48.927Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0233
Vulnerability from cvelistv5
Published
2018-04-19 20:00
Modified
2024-11-29 15:17
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000, Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103930 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Detection Engine |
Version: Cisco Firepower Detection Engine |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:14.414Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", }, { name: "103930", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/103930", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0233", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:44:30.094088Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T15:17:54.301Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Detection Engine", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Detection Engine", }, ], }, ], datePublic: "2018-04-19T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000, Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-21T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", }, { name: "103930", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/103930", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0233", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Detection Engine", version: { version_data: [ { version_value: "Cisco Firepower Detection Engine", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000, Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", }, { name: "103930", refsource: "BID", url: "http://www.securityfocus.com/bid/103930", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0233", datePublished: "2018-04-19T20:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T15:17:54.301Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20269
Vulnerability from cvelistv5
Published
2024-10-23 17:07
Modified
2024-10-24 17:51
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.7.0 Version: 6.4.0.11 Version: 6.6.3 Version: 6.7.0.1 Version: 6.6.4 Version: 6.4.0.12 Version: 6.7.0.2 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 6.7.0.3 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 6.6.7.2 Version: 7.2.5.2 Version: 7.3.1.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20269", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:40:08.577971Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:51:06.493Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:07:09.355Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwh69787", ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20269", datePublished: "2024-10-23T17:07:09.355Z", dateReserved: "2023-11-08T15:08:07.624Z", dateUpdated: "2024-10-24T17:51:06.493Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-3814
Vulnerability from cvelistv5
Published
2017-02-03 07:24
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass. More Information: CSCvb93980. Known Affected Releases: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/95942 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software 5.x 6.x |
Version: Cisco Firepower System Software 5.x 6.x |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:39:40.651Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", }, { name: "95942", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95942", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower System Software 5.x 6.x", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software 5.x 6.x", }, ], }, ], datePublic: "2017-02-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass. More Information: CSCvb93980. Known Affected Releases: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.", }, ], problemTypes: [ { descriptions: [ { description: "bypass ability to block certain web content", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-02-03T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", }, { name: "95942", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95942", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-3814", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software 5.x 6.x", version: { version_data: [ { version_value: "Cisco Firepower System Software 5.x 6.x", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass. More Information: CSCvb93980. Known Affected Releases: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "bypass ability to block certain web content", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", }, { name: "95942", refsource: "BID", url: "http://www.securityfocus.com/bid/95942", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-3814", datePublished: "2017-02-03T07:24:00", dateReserved: "2016-12-21T00:00:00", dateUpdated: "2024-08-05T14:39:40.651Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6435
Vulnerability from cvelistv5
Published
2016-10-06 10:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/40464/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt | x_refsource_MISC | |
https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking | x_refsource_MISC | |
http://www.securityfocus.com/bid/93421 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:20.145Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "40464", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/40464/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93421", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93421", }, { name: "20161005 Cisco Firepower Management Center Console Local File Inclusion Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-10-05T00:00:00", descriptions: [ { lang: "en", value: "The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-02T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "40464", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/40464/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93421", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93421", }, { name: "20161005 Cisco Firepower Management Center Console Local File Inclusion Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6435", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "40464", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/40464/", }, { name: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", refsource: "MISC", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", }, { name: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", refsource: "MISC", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93421", refsource: "BID", url: "http://www.securityfocus.com/bid/93421", }, { name: "20161005 Cisco Firepower Management Center Console Local File Inclusion Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6435", datePublished: "2016-10-06T10:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:20.145Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0384
Vulnerability from cvelistv5
Published
2018-07-16 17:00
Modified
2024-11-29 14:54
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104725 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041284 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco FireSIGHT unknown |
Version: Cisco FireSIGHT unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.600Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104725", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104725", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", }, { name: "1041284", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041284", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0384", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:32.135812Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:54:07.228Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco FireSIGHT unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco FireSIGHT unknown", }, ], }, ], datePublic: "2018-07-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-17T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104725", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104725", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", }, { name: "1041284", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041284", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco FireSIGHT unknown", version: { version_data: [ { version_value: "Cisco FireSIGHT unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "104725", refsource: "BID", url: "http://www.securityfocus.com/bid/104725", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", }, { name: "1041284", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041284", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0384", datePublished: "2018-07-16T17:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:54:07.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1970
Vulnerability from cvelistv5
Published
2019-08-08 07:35
Modified
2024-11-19 19:01
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:52.019Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190807 Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1970", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:23:28.922474Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:01:15.342Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-08T07:35:27", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190807 Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass", }, ], source: { advisory: "cisco-sa-20190807-ftd-bypass", defect: [ [ "CSCvo11350", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-07T16:00:00-0700", ID: "CVE-2019-1970", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "20190807 Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass", }, ], }, source: { advisory: "cisco-sa-20190807-ftd-bypass", defect: [ [ "CSCvo11350", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1970", datePublished: "2019-08-08T07:35:27.076771Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:01:15.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3301
Vulnerability from cvelistv5
Published
2020-05-06 16:42
Modified
2024-11-15 17:23
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.688Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3301", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:24:40.231838Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:23:23.050Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:42:11", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], source: { advisory: "cisco-sa-fmcua-statcred-weeCcZct", defect: [ [ "CSCvo08211", "CSCvq50674", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Static Credential Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3301", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Static Credential Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-798", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], }, source: { advisory: "cisco-sa-fmcua-statcred-weeCcZct", defect: [ [ "CSCvo08211", "CSCvq50674", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3301", datePublished: "2020-05-06T16:42:12.016638Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:23:23.050Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0333
Vulnerability from cvelistv5
Published
2018-06-07 21:00
Modified
2024-11-29 15:04
Severity ?
EPSS score ?
Summary
A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104422 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco FireSIGHT unknown |
Version: Cisco FireSIGHT unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.417Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104422", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104422", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0333", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:45.238893Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T15:04:50.878Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco FireSIGHT unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco FireSIGHT unknown", }, ], }, ], datePublic: "2018-06-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-09T09:57:02", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104422", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104422", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0333", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco FireSIGHT unknown", version: { version_data: [ { version_value: "Cisco FireSIGHT unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "104422", refsource: "BID", url: "http://www.securityfocus.com/bid/104422", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0333", datePublished: "2018-06-07T21:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T15:04:50.878Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12701
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-19 18:53
Severity ?
EPSS score ?
Summary
A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12701", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:42.341335Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:53:43.426Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:50", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass", }, ], source: { advisory: "cisco-sa-20191002-fire-bypass", defect: [ [ "CSCvp92361", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12701", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass", }, ], }, source: { advisory: "cisco-sa-20191002-fire-bypass", defect: [ [ "CSCvp92361", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12701", datePublished: "2019-10-02T19:06:50.155445Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-19T18:53:43.426Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1930
Vulnerability from cvelistv5
Published
2019-07-06 01:30
Modified
2024-11-21 19:19
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < 6.2.3.14 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:51.246Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1930", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:57:50.574543Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:19:18.922Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "6.2.3.14", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-07-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-07-06T01:30:29", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], source: { advisory: "cisco-sa-20190703-fmc-xss", defect: [ [ "CSCvo90805", "CSCvo92913", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-07-03T16:00:00-0700", ID: "CVE-2019-1930", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.2.3.14", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], }, source: { advisory: "cisco-sa-20190703-fmc-xss", defect: [ [ "CSCvo90805", "CSCvo92913", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1930", datePublished: "2019-07-06T01:30:29.192070Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:19:18.922Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0365
Vulnerability from cvelistv5
Published
2018-06-21 11:00
Modified
2024-11-29 14:55
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvb19750.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104519 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center unknown |
Version: Cisco Firepower Management Center unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", }, { name: "104519", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104519", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0365", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:50.866347Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:55:53.272Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center unknown", }, ], }, ], datePublic: "2018-06-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvb19750.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-352", description: "CWE-352", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-22T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", }, { name: "104519", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104519", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center unknown", version: { version_data: [ { version_value: "Cisco Firepower Management Center unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvb19750.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-352", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", }, { name: "104519", refsource: "BID", url: "http://www.securityfocus.com/bid/104519", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0365", datePublished: "2018-06-21T11:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:55:53.272Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3558
Vulnerability from cvelistv5
Published
2020-10-21 18:41
Modified
2024-11-13 17:45
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:55.314Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Open Redirect Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3558", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:22:42.836449Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:45:51.860Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-601", description: "CWE-601", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:41:19", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Open Redirect Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn", }, ], source: { advisory: "cisco-sa-fmc-redirect-NYDuSEQn", defect: [ [ "CSCvs71766", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Open Redirect Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3558", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Open Redirect Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.7", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-601", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Open Redirect Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn", }, ], }, source: { advisory: "cisco-sa-fmc-redirect-NYDuSEQn", defect: [ [ "CSCvs71766", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3558", datePublished: "2020-10-21T18:41:19.253965Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:45:51.860Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12300
Vulnerability from cvelistv5
Published
2017-11-16 07:00
Modified
2024-08-05 18:36
Severity ?
EPSS score ?
Summary
A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101862 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software |
Version: Cisco Firepower System Software |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:36:55.890Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "101862", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101862", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower System Software", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software", }, ], }, ], datePublic: "2017-11-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-17T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "101862", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101862", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12300", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software", version: { version_data: [ { version_value: "Cisco Firepower System Software", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "101862", refsource: "BID", url: "http://www.securityfocus.com/bid/101862", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12300", datePublished: "2017-11-16T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-08-05T18:36:55.890Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20840
Vulnerability from cvelistv5
Published
2022-11-10 17:41
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.974Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:10.587Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb61919", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20840", datePublished: "2022-11-10T17:41:02.903Z", dateReserved: "2021-11-02T13:28:29.179Z", dateUpdated: "2024-08-03T02:24:49.974Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1978
Vulnerability from cvelistv5
Published
2019-11-05 19:35
Modified
2024-11-19 18:52
Severity ?
EPSS score ?
Summary
A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:52.426Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1978", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:30.573813Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:52:18.299Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-05T19:35:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb", }, ], source: { advisory: "cisco-sa-20190816-ftd-srb", defect: [ [ "CSCvq39955", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-16T16:00:00-0700", ID: "CVE-2019-1978", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190816 Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb", }, ], }, source: { advisory: "cisco-sa-20190816-ftd-srb", defect: [ [ "CSCvq39955", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1978", datePublished: "2019-11-05T19:35:41.101564Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T18:52:18.299Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20410
Vulnerability from cvelistv5
Published
2024-10-23 17:38
Modified
2024-10-24 17:46
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20410", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:45.491201Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:46:41.091Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:38:43.124Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwj11119", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20410", datePublished: "2024-10-23T17:38:43.124Z", dateReserved: "2023-11-08T15:08:07.662Z", dateUpdated: "2024-10-24T17:46:41.091Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20364
Vulnerability from cvelistv5
Published
2024-10-23 17:28
Modified
2024-10-24 17:47
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20364", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:54.804812Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:47:52.081Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:28:31.674Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwj09456", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20364", datePublished: "2024-10-23T17:28:11.048Z", dateReserved: "2023-11-08T15:08:07.652Z", dateUpdated: "2024-10-24T17:47:52.081Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6715
Vulnerability from cvelistv5
Published
2017-07-04 00:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99209 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:17.595Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "99209", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99209", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-07-03T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.", }, ], problemTypes: [ { descriptions: [ { description: "Cross-Site Scripting Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-04T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "99209", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99209", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-6715", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Cross-Site Scripting Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "99209", refsource: "BID", url: "http://www.securityfocus.com/bid/99209", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-6715", datePublished: "2017-07-04T00:00:00", dateReserved: "2017-03-09T00:00:00", dateUpdated: "2024-08-05T15:41:17.595Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3311
Vulnerability from cvelistv5
Published
2020-05-06 16:40
Modified
2024-11-15 17:27
Severity ?
EPSS score ?
Summary
A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.960Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center Open Redirect Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3311", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:28:47.754438Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:27:02.065Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-601", description: "CWE-601", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:40:27", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center Open Redirect Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y", }, ], source: { advisory: "cisco-sa-fmc-webredirect-TcFgd42y", defect: [ [ "CSCvh03964", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Open Redirect Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3311", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Open Redirect Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-601", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center Open Redirect Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y", }, ], }, source: { advisory: "cisco-sa-fmc-webredirect-TcFgd42y", defect: [ [ "CSCvh03964", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3311", datePublished: "2020-05-06T16:40:27.986915Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:27:02.065Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3553
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:50
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.963Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3553", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:22:51.789924Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:50:50.672Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:15", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], source: { advisory: "cisco-sa-fmc-xss-6VqH4rpZ", defect: [ [ "CSCuw95798", "CSCvt35053", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3553", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], }, source: { advisory: "cisco-sa-fmc-xss-6VqH4rpZ", defect: [ [ "CSCuw95798", "CSCvt35053", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3553", datePublished: "2020-10-21T18:35:15.987102Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:50:50.672Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20743
Vulnerability from cvelistv5
Published
2022-05-03 03:15
Modified
2024-11-06 16:19
Severity ?
EPSS score ?
Summary
A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.416Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center File Upload Security Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20743", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:42.001654Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:19:47.640Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-434", description: "CWE-434", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:15:56", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center File Upload Security Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg", }, ], source: { advisory: "cisco-sa-fmc-security-bypass-JhOd29Gg", defect: [ [ "CSCwa40237", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center File Upload Security Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20743", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center File Upload Security Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.5", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-434", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center File Upload Security Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg", }, ], }, source: { advisory: "cisco-sa-fmc-security-bypass-JhOd29Gg", defect: [ [ "CSCwa40237", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20743", datePublished: "2022-05-03T03:15:56.090995Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:19:47.640Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1699
Vulnerability from cvelistv5
Published
2019-05-03 15:55
Modified
2024-11-20 17:23
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense (FTD) Software |
Version: unspecified < 6.2.3.12 Version: unspecified < 6.3.0.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:41.088Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1699", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:55:16.783879Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:23:45.548Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense (FTD) Software", vendor: "Cisco", versions: [ { lessThan: "6.2.3.12", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "6.3.0.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-01T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-03T15:55:15", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject", }, ], source: { advisory: "cisco-sa-20190501-ftd-cmd-inject", defect: [ [ "CSCvm14217", "CSCvn33026", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Command Injection Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-01T16:00:00-0700", ID: "CVE-2019-1699", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Command Injection Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense (FTD) Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.2.3.12", }, { affected: "<", version_affected: "<", version_value: "6.3.0.3", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.7", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-78", }, ], }, ], }, references: { reference_data: [ { name: "20190501 Cisco Firepower Threat Defense Software Command Injection Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject", }, ], }, source: { advisory: "cisco-sa-20190501-ftd-cmd-inject", defect: [ [ "CSCvm14217", "CSCvn33026", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1699", datePublished: "2019-05-03T15:55:15.051426Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-20T17:23:45.548Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20074
Vulnerability from cvelistv5
Published
2023-11-01 16:53
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.827Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:41.556Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], source: { advisory: "cisco-sa-fmc-xss-sK2gkfvJ", defects: [ "CSCwd95580", "CSCwf31176", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20074", datePublished: "2023-11-01T16:53:24.573Z", dateReserved: "2022-10-27T18:47:50.329Z", dateUpdated: "2024-08-02T08:57:35.827Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-34754
Vulnerability from cvelistv5
Published
2021-10-27 18:55
Modified
2024-11-07 21:46
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T00:19:48.159Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20211027 Cisco Firepower Threat Defense Software Ethernet Industrial Protocol Policy Bypass Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-34754", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:44:35.126748Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:46:19.292Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-10-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-27T18:55:11", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20211027 Cisco Firepower Threat Defense Software Ethernet Industrial Protocol Policy Bypass Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP", }, ], source: { advisory: "cisco-sa-ftd-enip-bypass-eFsxd8KP", defect: [ [ "CSCvy02240", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Ethernet Industrial Protocol Policy Bypass Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-10-27T16:00:00", ID: "CVE-2021-34754", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Ethernet Industrial Protocol Policy Bypass Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20211027 Cisco Firepower Threat Defense Software Ethernet Industrial Protocol Policy Bypass Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP", }, ], }, source: { advisory: "cisco-sa-ftd-enip-bypass-eFsxd8KP", defect: [ [ "CSCvy02240", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-34754", datePublished: "2021-10-27T18:55:11.850764Z", dateReserved: "2021-06-15T00:00:00", dateUpdated: "2024-11-07T21:46:19.292Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12680
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.188Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12680", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:33.208086Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:08:33.278Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:40", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12680", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12680", datePublished: "2019-10-02T19:06:40.960998Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:08:33.278Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12682
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.163Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12682", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:28.663068Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:08:12.886Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12682", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12682", datePublished: "2019-10-02T19:06:41.886232Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:08:12.886Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1696
Vulnerability from cvelistv5
Published
2019-05-03 15:10
Modified
2024-11-19 19:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108171 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < 6.2.3.12 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:41.083Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort", }, { name: "108171", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108171", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1696", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:24:30.595617Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:09:35.484Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "6.2.3.12", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-01T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-07T13:06:06", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190501 Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort", }, { name: "108171", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108171", }, ], source: { advisory: "cisco-sa-20190501-frpwr-smb-snort", defect: [ [ "CSCvj83264", "CSCvj91418", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-01T16:00:00-0700", ID: "CVE-2019-1696", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.2.3.12", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "7.5", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "20190501 Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort", }, { name: "108171", refsource: "BID", url: "http://www.securityfocus.com/bid/108171", }, ], }, source: { advisory: "cisco-sa-20190501-frpwr-smb-snort", defect: [ [ "CSCvj83264", "CSCvj91418", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1696", datePublished: "2019-05-03T15:10:15.109681Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:09:35.484Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6717
Vulnerability from cvelistv5
Published
2017-07-04 00:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc38801. Known Affected Releases: 6.0.1.3 6.2.1. Known Fixed Releases: 6.2.1.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/99217 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:16.675Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", }, { name: "99217", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99217", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-07-03T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc38801. Known Affected Releases: 6.0.1.3 6.2.1. Known Fixed Releases: 6.2.1.", }, ], problemTypes: [ { descriptions: [ { description: "Cross-Site Scripting Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-04T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", }, { name: "99217", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99217", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-6717", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc38801. Known Affected Releases: 6.0.1.3 6.2.1. Known Fixed Releases: 6.2.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Cross-Site Scripting Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", }, { name: "99217", refsource: "BID", url: "http://www.securityfocus.com/bid/99217", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-6717", datePublished: "2017-07-04T00:00:00", dateReserved: "2017-03-09T00:00:00", dateUpdated: "2024-08-05T15:41:16.675Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6434
Vulnerability from cvelistv5
Published
2016-10-06 10:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1 | vendor-advisory, x_refsource_CISCO | |
https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt | x_refsource_MISC | |
https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking | x_refsource_MISC | |
http://www.securityfocus.com/bid/93412 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/40465/ | exploit, x_refsource_EXPLOIT-DB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:19.989Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20161005 Cisco Firepower Management Center Console Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93412", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93412", }, { name: "40465", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/40465/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-10-05T00:00:00", descriptions: [ { lang: "en", value: "Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-02T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20161005 Cisco Firepower Management Center Console Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1", }, { tags: [ "x_refsource_MISC", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93412", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93412", }, { name: "40465", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/40465/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6434", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20161005 Cisco Firepower Management Center Console Authentication Bypass Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1", }, { name: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", refsource: "MISC", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", }, { name: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", refsource: "MISC", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { name: "93412", refsource: "BID", url: "http://www.securityfocus.com/bid/93412", }, { name: "40465", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/40465/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6434", datePublished: "2016-10-06T10:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:19.989Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20273
Vulnerability from cvelistv5
Published
2024-10-23 17:07
Modified
2024-10-24 17:49
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.7.0 Version: 6.4.0.11 Version: 6.6.3 Version: 6.7.0.1 Version: 6.6.4 Version: 6.4.0.12 Version: 6.7.0.2 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 6.7.0.3 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 6.6.7.2 Version: 7.2.5.2 Version: 7.3.1.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20273", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:40:06.716882Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:49:10.237Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:07:29.031Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwh70866", ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20273", datePublished: "2024-10-23T17:07:29.031Z", dateReserved: "2023-11-08T15:08:07.625Z", dateUpdated: "2024-10-24T17:49:10.237Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20926
Vulnerability from cvelistv5
Published
2022-11-10 17:36
Modified
2024-10-25 16:04
Severity ?
EPSS score ?
Summary
A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:57.398Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-cmd-inj-Z3B5MY35", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20926", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:50.418507Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:04:46.862Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:14.489Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmd-inj-Z3B5MY35", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], source: { advisory: "cisco-sa-fmc-cmd-inj-Z3B5MY35", defects: [ "CSCwb23048", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20926", datePublished: "2022-11-10T17:36:29.914Z", dateReserved: "2021-11-02T13:28:29.191Z", dateUpdated: "2024-10-25T16:04:46.862Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20220
Vulnerability from cvelistv5
Published
2023-11-01 17:09
Modified
2024-10-24 17:39
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2..12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-20220", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-05-31T04:00:11.081606Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:39:44.432Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T09:05:35.426Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-cmdinj-bTEgufOX", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:58:23.366Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-cmdinj-bTEgufOX", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], source: { advisory: "cisco-sa-fmc-cmdinj-bTEgufOX", defects: [ "CSCwf63215", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20220", datePublished: "2023-11-01T17:09:42.596Z", dateReserved: "2022-10-27T18:47:50.368Z", dateUpdated: "2024-10-24T17:39:44.432Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1833
Vulnerability from cvelistv5
Published
2019-05-16 01:20
Modified
2024-11-19 19:06
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108338 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.820Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190515 Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass", }, { name: "108338", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108338", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1833", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:24:09.941747Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:06:47.418Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-16T09:06:04", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190515 Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass", }, { name: "108338", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108338", }, ], source: { advisory: "cisco-sa-20190515-ftd-ssltls-bypass", defect: [ [ "CSCvi81022", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-15T16:00:00-0700", ID: "CVE-2019-1833", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-693", }, ], }, ], }, references: { reference_data: [ { name: "20190515 Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass", }, { name: "108338", refsource: "BID", url: "http://www.securityfocus.com/bid/108338", }, ], }, source: { advisory: "cisco-sa-20190515-ftd-ssltls-bypass", defect: [ [ "CSCvi81022", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1833", datePublished: "2019-05-16T01:20:54.043198Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:06:47.418Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20360
Vulnerability from cvelistv5
Published
2024-05-22 17:46
Modified
2024-08-01 21:59
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20360", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-05-23T14:29:11.291846Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T17:40:39.489Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:59:42.328Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-sqli-WFFDnNOs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-22T17:46:25.091Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-sqli-WFFDnNOs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs", }, ], source: { advisory: "cisco-sa-fmc-sqli-WFFDnNOs", defects: [ "CSCwf92182", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20360", datePublished: "2024-05-22T17:46:25.091Z", dateReserved: "2023-11-08T15:08:07.650Z", dateUpdated: "2024-08-01T21:59:42.328Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12689
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.249Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12689", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:15.651264Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:15.187Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:44", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689", }, ], source: { advisory: "cisco-sa-20191002-fmc-rce-12689", defect: [ [ "CSCvh03951", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Remote Code Execution Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12689", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Remote Code Execution Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.5", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center Remote Code Execution Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-rce-12689", defect: [ [ "CSCvh03951", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12689", datePublished: "2019-10-02T19:06:45.060978Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:15.187Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3308
Vulnerability from cvelistv5
Published
2020-05-06 16:50
Modified
2024-11-15 17:22
Severity ?
EPSS score ?
Summary
A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.461Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3308", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:28:30.808912Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:22:15.207Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-347", description: "CWE-347", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:50:28", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP", }, ], source: { advisory: "cisco-sa-sigbypass-FcvPPCeP", defect: [ [ "CSCvg16015", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3308", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.9", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-347", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP", }, ], }, source: { advisory: "cisco-sa-sigbypass-FcvPPCeP", defect: [ [ "CSCvg16015", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3308", datePublished: "2020-05-06T16:50:29.053566Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:22:15.207Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12683
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.214Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12683", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:26.807017Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:08:03.549Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:42", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12683", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12683", datePublished: "2019-10-02T19:06:42.426080Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:08:03.549Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3410
Vulnerability from cvelistv5
Published
2020-10-21 18:36
Modified
2024-11-13 17:48
Severity ?
EPSS score ?
Summary
A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.398Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3410", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:17:18.352949Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:48:29.260Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:36:28", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q", }, ], source: { advisory: "cisco-sa-fmc-cacauthbyp-NCLGZm3Q", defect: [ [ "CSCvv16245", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3410", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-287", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q", }, ], }, source: { advisory: "cisco-sa-fmc-cacauthbyp-NCLGZm3Q", defect: [ [ "CSCvv16245", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3410", datePublished: "2020-10-21T18:36:28.566124Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:48:29.260Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1126
Vulnerability from cvelistv5
Published
2021-01-13 21:20
Modified
2024-11-12 20:47
Severity ?
EPSS score ?
Summary
A vulnerability in the storage of proxy server credentials of Cisco Firepower Management Center (FMC) could allow an authenticated, local attacker to view credentials for a configured proxy server. The vulnerability is due to clear-text storage and weak permissions of related configuration files. An attacker could exploit this vulnerability by accessing the CLI of the affected software and viewing the contents of the affected files. A successful exploit could allow the attacker to view the credentials that are used to access the proxy server.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:55:18.590Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Cisco Firepower Management Center Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1126", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:54:09.817309Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:47:01.218Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the storage of proxy server credentials of Cisco Firepower Management Center (FMC) could allow an authenticated, local attacker to view credentials for a configured proxy server. The vulnerability is due to clear-text storage and weak permissions of related configuration files. An attacker could exploit this vulnerability by accessing the CLI of the affected software and viewing the contents of the affected files. A successful exploit could allow the attacker to view the credentials that are used to access the proxy server.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-256", description: "CWE-256", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T21:20:43", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Cisco Firepower Management Center Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f", }, ], source: { advisory: "cisco-sa-fmc-infodisc-RJdktM6f", defect: [ [ "CSCvh67867", "CSCvp40452", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Information Disclosure Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-01-13T16:00:00", ID: "CVE-2021-1126", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Information Disclosure Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the storage of proxy server credentials of Cisco Firepower Management Center (FMC) could allow an authenticated, local attacker to view credentials for a configured proxy server. The vulnerability is due to clear-text storage and weak permissions of related configuration files. An attacker could exploit this vulnerability by accessing the CLI of the affected software and viewing the contents of the affected files. A successful exploit could allow the attacker to view the credentials that are used to access the proxy server.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.5", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-256", }, ], }, ], }, references: { reference_data: [ { name: "20210113 Cisco Firepower Management Center Information Disclosure Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f", }, ], }, source: { advisory: "cisco-sa-fmc-infodisc-RJdktM6f", defect: [ [ "CSCvh67867", "CSCvp40452", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1126", datePublished: "2021-01-13T21:20:43.475334Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:47:01.218Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20936
Vulnerability from cvelistv5
Published
2022-11-10 17:42
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:59.633Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:16.792Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb02018", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20936", datePublished: "2022-11-10T17:42:30.581Z", dateReserved: "2021-11-02T13:28:29.192Z", dateUpdated: "2024-08-03T02:31:59.633Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6439
Vulnerability from cvelistv5
Published
2016-10-27 21:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037061 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/93787 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software before 6.0.1 |
Version: Cisco Firepower System Software before 6.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:20.026Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", }, { name: "1037061", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037061", }, { name: "93787", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93787", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower System Software before 6.0.1", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software before 6.0.1", }, ], }, ], datePublic: "2016-10-27T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.", }, ], problemTypes: [ { descriptions: [ { description: "unspecified", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-28T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", }, { name: "1037061", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037061", }, { name: "93787", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93787", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6439", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software before 6.0.1", version: { version_data: [ { version_value: "Cisco Firepower System Software before 6.0.1", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "unspecified", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", }, { name: "1037061", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037061", }, { name: "93787", refsource: "BID", url: "http://www.securityfocus.com/bid/93787", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6439", datePublished: "2016-10-27T21:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:20.026Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12679
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.254Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12679", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:35.180448Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:08:41.833Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:40", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12679", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12679", datePublished: "2019-10-02T19:06:40.527328Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:08:41.833Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20941
Vulnerability from cvelistv5
Published
2022-11-10 17:37
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.
This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:58.593Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-info-disc-UghNRRhP", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.\r\n\r This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-334", description: "Small Space of Random Values", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:18.118Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-info-disc-UghNRRhP", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP", }, ], source: { advisory: "cisco-sa-fmc-info-disc-UghNRRhP", defects: [ "CSCwa85709", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20941", datePublished: "2022-11-10T17:37:46.897Z", dateReserved: "2021-11-02T13:28:29.193Z", dateUpdated: "2024-08-03T02:31:58.593Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1949
Vulnerability from cvelistv5
Published
2019-08-08 07:25
Modified
2024-11-21 19:17
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < 6.4.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:51.259Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190807 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1949", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:57:36.894152Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:17:56.885Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "6.4.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-08T07:25:25", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190807 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss", }, ], source: { advisory: "cisco-sa-20190807-fmc-xss", defect: [ [ "CSCvn48907", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-07T16:00:00-0700", ID: "CVE-2019-1949", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.4.0", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20190807 Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss", }, ], }, source: { advisory: "cisco-sa-20190807-fmc-xss", defect: [ [ "CSCvn48907", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1949", datePublished: "2019-08-08T07:25:25.334720Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:17:56.885Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3320
Vulnerability from cvelistv5
Published
2020-10-08 04:20
Modified
2024-11-13 17:53
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.835Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201007 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3320", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:23:05.366131Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:53:34.948Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-08T04:20:12", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201007 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU", }, ], source: { advisory: "cisco-sa-fmc-xss-yLrjqqU", defect: [ [ "CSCvs72390", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-07T16:00:00", ID: "CVE-2020-3320", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.4", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20201007 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU", }, ], }, source: { advisory: "cisco-sa-fmc-xss-yLrjqqU", defect: [ [ "CSCvs72390", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3320", datePublished: "2020-10-08T04:20:12.411862Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:53:34.948Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1342
Vulnerability from cvelistv5
Published
2016-02-26 02:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:55:14.149Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160224 Cisco FirePOWER Management Center Unauthenticated Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-24T00:00:00", descriptions: [ { lang: "en", value: "The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-02-26T04:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20160224 Cisco FirePOWER Management Center Unauthenticated Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-1342", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160224 Cisco FirePOWER Management Center Unauthenticated Information Disclosure Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-1342", datePublished: "2016-02-26T02:00:00", dateReserved: "2016-01-04T00:00:00", dateUpdated: "2024-08-05T22:55:14.149Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12245
Vulnerability from cvelistv5
Published
2017-10-05 07:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101118 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Detection Engine |
Version: Cisco Firepower Detection Engine |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.699Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "101118", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101118", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Detection Engine", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Detection Engine", }, ], }, ], datePublic: "2017-10-05T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-05T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "101118", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101118", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12245", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Detection Engine", version: { version_data: [ { version_value: "Cisco Firepower Detection Engine", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "101118", refsource: "BID", url: "http://www.securityfocus.com/bid/101118", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12245", datePublished: "2017-10-05T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-08-05T18:28:16.699Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-16028
Vulnerability from cvelistv5
Published
2020-09-23 00:26
Modified
2024-11-13 18:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T01:03:32.759Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200122 Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-16028", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:10:46.853607Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:05:07.592Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-01-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-23T00:26:14", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200122 Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth", }, ], source: { advisory: "cisco-sa-20200122-fmc-auth", defect: [ [ "CSCvr95287", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-01-22T16:00:00", ID: "CVE-2019-16028", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-287", }, ], }, ], }, references: { reference_data: [ { name: "20200122 Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth", }, ], }, source: { advisory: "cisco-sa-20200122-fmc-auth", defect: [ [ "CSCvr95287", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-16028", datePublished: "2020-09-23T00:26:14.168709Z", dateReserved: "2019-09-06T00:00:00", dateUpdated: "2024-11-13T18:05:07.592Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1931
Vulnerability from cvelistv5
Published
2019-07-06 01:30
Modified
2024-11-21 19:19
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < 6.2.3.14 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:50.820Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1931", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:57:51.828105Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:19:28.533Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "6.2.3.14", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-07-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-07-06T01:30:24", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], source: { advisory: "cisco-sa-20190703-fmc-xss", defect: [ [ "CSCvo90805", "CSCvo92913", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-07-03T16:00:00-0700", ID: "CVE-2019-1931", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "6.2.3.14", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20190703 Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], }, source: { advisory: "cisco-sa-20190703-fmc-xss", defect: [ [ "CSCvo90805", "CSCvo92913", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1931", datePublished: "2019-07-06T01:30:24.918871Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:19:28.533Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12684
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.250Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12684", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:24.511441Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:54.284Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:42", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12684", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12684", datePublished: "2019-10-02T19:06:42.865638Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:54.284Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3318
Vulnerability from cvelistv5
Published
2020-05-06 16:40
Modified
2024-11-15 17:26
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.026Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3318", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:24:42.773503Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:26:20.467Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:40:46", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], source: { advisory: "cisco-sa-fmcua-statcred-weeCcZct", defect: [ [ "CSCvo08211", "CSCvq50674", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Static Credential Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3318", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Static Credential Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-798", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center Static Credential Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], }, source: { advisory: "cisco-sa-fmcua-statcred-weeCcZct", defect: [ [ "CSCvo08211", "CSCvq50674", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3318", datePublished: "2020-05-06T16:40:46.937185Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:26:20.467Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20473
Vulnerability from cvelistv5
Published
2024-10-23 17:51
Modified
2024-10-23 20:59
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20473", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T20:56:35.913710Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T20:59:03.182Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:51:01.385Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-sql-inj-LOYAFcfq", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], source: { advisory: "cisco-sa-fmc-sql-inj-LOYAFcfq", defects: [ "CSCwi78601", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20473", datePublished: "2024-10-23T17:51:01.385Z", dateReserved: "2023-11-08T15:08:07.681Z", dateUpdated: "2024-10-23T20:59:03.182Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20834
Vulnerability from cvelistv5
Published
2022-11-10 17:39
Modified
2024-10-25 16:04
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.088Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20834", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:48.727533Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:04:39.064Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:08.766Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb02006", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20834", datePublished: "2022-11-10T17:39:05.891Z", dateReserved: "2021-11-02T13:28:29.177Z", dateUpdated: "2024-10-25T16:04:39.064Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20833
Vulnerability from cvelistv5
Published
2022-11-10 17:38
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.020Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:08.409Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb01995", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20833", datePublished: "2022-11-10T17:38:54.123Z", dateReserved: "2021-11-02T13:28:29.177Z", dateUpdated: "2024-08-03T02:24:50.020Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3514
Vulnerability from cvelistv5
Published
2020-10-21 18:35
Modified
2024-11-13 17:49
Severity ?
EPSS score ?
Summary
A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.656Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3514", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:17:26.956982Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:49:45.378Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-216", description: "CWE-216", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:35:50", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV", }, ], source: { advisory: "cisco-sa-ftd-container-esc-FmYqFBQV", defect: [ [ "CSCvu08422", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3514", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.2", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-216", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV", }, ], }, source: { advisory: "cisco-sa-ftd-container-esc-FmYqFBQV", defect: [ [ "CSCvu08422", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3514", datePublished: "2020-10-21T18:35:50.415093Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:49:45.378Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20471
Vulnerability from cvelistv5
Published
2024-10-23 17:47
Modified
2024-10-24 14:26
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "firepower_management_center", vendor: "cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20471", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-24T14:16:17.727790Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T14:26:22.403Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:47:42.116Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-sql-inj-LOYAFcfq", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], source: { advisory: "cisco-sa-fmc-sql-inj-LOYAFcfq", defects: [ "CSCwi78596", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20471", datePublished: "2024-10-23T17:47:42.116Z", dateReserved: "2023-11-08T15:08:07.681Z", dateUpdated: "2024-10-24T14:26:22.403Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1980
Vulnerability from cvelistv5
Published
2019-11-05 19:35
Modified
2024-11-19 18:52
Severity ?
EPSS score ?
Summary
A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:52.346Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1980", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:29.360474Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:52:10.436Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Threat Defense Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-05T19:35:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd", }, ], source: { advisory: "cisco-sa-20190816-ftd-nspd", defect: [ [ "CSCvq39888", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-16T16:00:00-0700", ID: "CVE-2019-1980", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190816 Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd", }, ], }, source: { advisory: "cisco-sa-20190816-ftd-nspd", defect: [ [ "CSCvq39888", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1980", datePublished: "2019-11-05T19:35:41.544096Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T18:52:10.436Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1982
Vulnerability from cvelistv5
Published
2019-11-05 19:35
Modified
2024-11-19 18:51
Severity ?
EPSS score ?
Summary
A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:35:52.175Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1982", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:26.870769Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:51:53.061Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-08-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-05T19:35:42", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190816 Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http", }, ], source: { advisory: "cisco-sa-20190816-ftd-http", defect: [ [ "CSCvj19544", "CSCvq07297", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-08-16T16:00:00-0700", ID: "CVE-2019-1982", STATE: "PUBLIC", TITLE: "Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190816 Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http", }, ], }, source: { advisory: "cisco-sa-20190816-ftd-http", defect: [ [ "CSCvj19544", "CSCvq07297", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1982", datePublished: "2019-11-05T19:35:42.343253Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T18:51:53.061Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20415
Vulnerability from cvelistv5
Published
2024-10-23 17:46
Modified
2024-10-23 20:54
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20415", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T20:54:49.796489Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-23T20:54:58.239Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:46:02.736Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwi61058", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20415", datePublished: "2024-10-23T17:46:02.736Z", dateReserved: "2023-11-08T15:08:07.663Z", dateUpdated: "2024-10-23T20:54:58.239Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9193
Vulnerability from cvelistv5
Published
2016-12-14 00:37
Modified
2024-08-06 02:42
Severity ?
EPSS score ?
Summary
A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94801 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037421 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco FireSIGHT |
Version: Cisco FireSIGHT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:42:11.261Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", }, { name: "94801", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94801", }, { name: "1037421", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037421", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco FireSIGHT", vendor: "n/a", versions: [ { status: "affected", version: "Cisco FireSIGHT", }, ], }, ], datePublic: "2016-12-13T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.", }, ], problemTypes: [ { descriptions: [ { description: "unspecified", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-20T21:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", }, { name: "94801", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94801", }, { name: "1037421", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037421", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-9193", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco FireSIGHT", version: { version_data: [ { version_value: "Cisco FireSIGHT", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "unspecified", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", }, { name: "94801", refsource: "BID", url: "http://www.securityfocus.com/bid/94801", }, { name: "1037421", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037421", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-9193", datePublished: "2016-12-14T00:37:00", dateReserved: "2016-11-06T00:00:00", dateUpdated: "2024-08-06T02:42:11.261Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-15458
Vulnerability from cvelistv5
Published
2019-01-10 19:00
Modified
2024-11-19 19:18
Severity ?
EPSS score ?
Summary
A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106516 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:54:03.549Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106516", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106516", }, { name: "20190109 Cisco Firepower Management Center Disk Utilization Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-15458", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:25:41.191548Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:18:26.792Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-09T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-01-11T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "106516", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106516", }, { name: "20190109 Cisco Firepower Management Center Disk Utilization Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos", }, ], source: { advisory: "cisco-sa-20190109-fpwr-mc-dos", defect: [ [ "CSCvk20751", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Disk Utilization Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-01-09T16:00:00-0800", ID: "CVE-2018-15458", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Disk Utilization Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "106516", refsource: "BID", url: "http://www.securityfocus.com/bid/106516", }, { name: "20190109 Cisco Firepower Management Center Disk Utilization Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos", }, ], }, source: { advisory: "cisco-sa-20190109-fpwr-mc-dos", defect: [ [ "CSCvk20751", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-15458", datePublished: "2019-01-10T19:00:00Z", dateReserved: "2018-08-17T00:00:00", dateUpdated: "2024-11-19T19:18:26.792Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1456
Vulnerability from cvelistv5
Published
2021-04-29 17:30
Modified
2024-11-08 23:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.347Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1456", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:45:02.809489Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:24:08.395Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T17:30:42", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-28T16:00:00", ID: "CVE-2021-1456", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], }, source: { advisory: "cisco-sa-fmc-xss-yT8LNSeA", defect: [ [ "CSCvw93272", "CSCvw93276", "CSCvw93282", "CSCvw93513", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1456", datePublished: "2021-04-29T17:30:42.849992Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:24:08.395Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6716
Vulnerability from cvelistv5
Published
2017-07-04 00:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework code of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. Affected Products: Cisco Firepower Management Center Software Releases prior to 6.0.0.0. More Information: CSCuy88785. Known Affected Releases: 5.4.1.6.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/99220 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower Management Center |
Version: Cisco Firepower Management Center |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:17.521Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", }, { name: "99220", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99220", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower Management Center", }, ], }, ], datePublic: "2017-07-03T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework code of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. Affected Products: Cisco Firepower Management Center Software Releases prior to 6.0.0.0. More Information: CSCuy88785. Known Affected Releases: 5.4.1.6.", }, ], problemTypes: [ { descriptions: [ { description: "Stored Cross-Site Scripting Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-04T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", }, { name: "99220", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99220", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-6716", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "Cisco Firepower Management Center", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework code of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. Affected Products: Cisco Firepower Management Center Software Releases prior to 6.0.0.0. More Information: CSCuy88785. Known Affected Releases: 5.4.1.6.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Stored Cross-Site Scripting Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", }, { name: "99220", refsource: "BID", url: "http://www.securityfocus.com/bid/99220", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-6716", datePublished: "2017-07-04T00:00:00", dateReserved: "2017-03-09T00:00:00", dateUpdated: "2024-08-05T15:41:17.521Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15992
Vulnerability from cvelistv5
Published
2020-09-23 00:27
Modified
2024-11-13 18:47
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T01:03:32.832Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191112 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-15992", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T18:46:49.657176Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:47:14.541Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Adaptive Security Appliance (ASA) Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-11-12T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-23T00:27:04", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191112 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce", }, ], source: { advisory: "cisco-sa-20191112-asa-ftd-lua-rce", defect: [ [ "CSCvr85295", "CSCvr96680", ], ], discovery: "INTERNAL", }, title: "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-11-12T13:15:00", ID: "CVE-2019-15992", STATE: "PUBLIC", TITLE: "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Adaptive Security Appliance (ASA) Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.", }, ], impact: { cvss: { baseScore: "7.2", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20191112 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce", }, ], }, source: { advisory: "cisco-sa-20191112-asa-ftd-lua-rce", defect: [ [ "CSCvr85295", "CSCvr96680", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-15992", datePublished: "2020-09-23T00:27:04.203191Z", dateReserved: "2019-09-06T00:00:00", dateUpdated: "2024-11-13T18:47:14.541Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20206
Vulnerability from cvelistv5
Published
2023-11-01 16:52
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:35.381Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:59.329Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-sK2gkfvJ", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], source: { advisory: "cisco-sa-fmc-xss-sK2gkfvJ", defects: [ "CSCwf36674", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20206", datePublished: "2023-11-01T16:52:45.782Z", dateReserved: "2022-10-27T18:47:50.367Z", dateUpdated: "2024-08-02T09:05:35.381Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20629
Vulnerability from cvelistv5
Published
2022-05-03 03:16
Modified
2024-11-06 16:18
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:17:52.934Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20629", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:36.632908Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:18:26.954Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:16:34", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20629", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.4", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], }, source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20629", datePublished: "2022-05-03T03:16:34.108193Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:18:26.954Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6365
Vulnerability from cvelistv5
Published
2016-08-23 01:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/92510 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:19.140Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160817 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc", }, { name: "92510", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92510", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-17T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20160817 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc", }, { name: "92510", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92510", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2016-6365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160817 Cisco Firepower Management Center Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc", }, { name: "92510", refsource: "BID", url: "http://www.securityfocus.com/bid/92510", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2016-6365", datePublished: "2016-08-23T01:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:19.140Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12686
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-20 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.188Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12686", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:20.234131Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:07:36.137Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:43", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center SQL Injection Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12686", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center SQL Injection Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco Firepower Management Center SQL Injection Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], }, source: { advisory: "cisco-sa-20191002-fmc-sql-inj", defect: [ [ "CSCvh03939", "CSCvh03949", "CSCvh03955", "CSCvh77430", "CSCvh77441", "CSCvh77600", "CSCvh77847", "CSCvn69019", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12686", datePublished: "2019-10-02T19:06:43.763117Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:07:36.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12700
Vulnerability from cvelistv5
Published
2019-10-02 19:06
Modified
2024-11-21 19:12
Severity ?
EPSS score ?
Summary
A vulnerability in the configuration of the Pluggable Authentication Module (PAM) used in Cisco Firepower Threat Defense (FTD) Software, Cisco Firepower Management Center (FMC) Software, and Cisco FXOS Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper resource management in the context of user session management. An attacker could exploit this vulnerability by connecting to an affected system and performing many simultaneous successful Secure Shell (SSH) logins. A successful exploit could allow the attacker to exhaust system resources and cause the device to reload, resulting in a DoS condition. To exploit this vulnerability, the attacker needs valid user credentials on the system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.252Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191002 Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12700", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:56:40.420140Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:12:01.659Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the configuration of the Pluggable Authentication Module (PAM) used in Cisco Firepower Threat Defense (FTD) Software, Cisco Firepower Management Center (FMC) Software, and Cisco FXOS Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper resource management in the context of user session management. An attacker could exploit this vulnerability by connecting to an affected system and performing many simultaneous successful Secure Shell (SSH) logins. A successful exploit could allow the attacker to exhaust system resources and cause the device to reload, resulting in a DoS condition. To exploit this vulnerability, the attacker needs valid user credentials on the system.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-02T19:06:49", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191002 Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos", }, ], source: { advisory: "cisco-sa-20191002-ftd-fpmc-dos", defect: [ [ "CSCvm92401", "CSCvn83385", ], ], discovery: "INTERNAL", }, title: "Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-02T16:00:00-0700", ID: "CVE-2019-12700", STATE: "PUBLIC", TITLE: "Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the configuration of the Pluggable Authentication Module (PAM) used in Cisco Firepower Threat Defense (FTD) Software, Cisco Firepower Management Center (FMC) Software, and Cisco FXOS Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper resource management in the context of user session management. An attacker could exploit this vulnerability by connecting to an affected system and performing many simultaneous successful Secure Shell (SSH) logins. A successful exploit could allow the attacker to exhaust system resources and cause the device to reload, resulting in a DoS condition. To exploit this vulnerability, the attacker needs valid user credentials on the system.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.7", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "20191002 Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos", }, ], }, source: { advisory: "cisco-sa-20191002-ftd-fpmc-dos", defect: [ [ "CSCvm92401", "CSCvn83385", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12700", datePublished: "2019-10-02T19:06:49.655979Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-21T19:12:01.659Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20627
Vulnerability from cvelistv5
Published
2022-05-03 03:16
Modified
2024-11-06 16:17
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:17:52.869Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20627", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:34.182902Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:17:58.627Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:16:45", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20627", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.4", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], }, source: { advisory: "cisco-sa-fmc-xss-qXz4uAkM", defect: [ [ "CSCvz24238", "CSCvz30558", "CSCvz30582", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20627", datePublished: "2022-05-03T03:16:45.597587Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:17:58.627Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0385
Vulnerability from cvelistv5
Published
2018-07-16 17:00
Modified
2024-11-29 14:53
Severity ?
EPSS score ?
Summary
A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input handling of the SSL traffic. An attacker could exploit this vulnerability by sending a crafted SSL traffic to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco Bug IDs: CSCvi36434.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104727 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower unknown |
Version: Cisco Firepower unknown |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.593Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104727", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104727", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0385", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:30.935261Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:56.750Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower unknown", }, ], }, ], datePublic: "2018-07-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input handling of the SSL traffic. An attacker could exploit this vulnerability by sending a crafted SSL traffic to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco Bug IDs: CSCvi36434.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-17T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104727", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104727", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0385", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower unknown", version: { version_data: [ { version_value: "Cisco Firepower unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input handling of the SSL traffic. An attacker could exploit this vulnerability by sending a crafted SSL traffic to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco Bug IDs: CSCvi36434.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "104727", refsource: "BID", url: "http://www.securityfocus.com/bid/104727", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0385", datePublished: "2018-07-16T17:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:56.750Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20932
Vulnerability from cvelistv5
Published
2022-11-10 17:41
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:58.076Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:15.797Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwa93499", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20932", datePublished: "2022-11-10T17:41:59.258Z", dateReserved: "2021-11-02T13:28:29.192Z", dateUpdated: "2024-08-03T02:31:58.076Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20264
Vulnerability from cvelistv5
Published
2024-10-23 17:06
Modified
2024-10-24 17:52
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.1.0 Version: 7.1.0.1 Version: 7.2.0 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.2.1 Version: 7.2.2 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.5.2 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20264", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:40:12.685847Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:52:43.490Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.5.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:06:48.407Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { name: "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwf61443", ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20264", datePublished: "2024-10-23T17:06:48.407Z", dateReserved: "2023-11-08T15:08:07.624Z", dateUpdated: "2024-10-24T17:52:43.490Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20372
Vulnerability from cvelistv5
Published
2024-10-23 17:29
Modified
2024-10-24 17:47
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.4.0.16 Version: 6.4.0.17 Version: 6.4.0.18 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.6.7.1 Version: 6.6.7.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.0.5 Version: 7.0.6 Version: 7.0.6.1 Version: 7.0.6.2 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.1.0.3 Version: 7.2.0 Version: 7.2.1 Version: 7.2.2 Version: 7.2.0.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.2.4.1 Version: 7.2.5 Version: 7.2.5.1 Version: 7.2.6 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.2.8.1 Version: 7.3.0 Version: 7.3.1 Version: 7.3.1.1 Version: 7.3.1.2 Version: 7.4.0 Version: 7.4.1 Version: 7.4.1.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20372", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T18:39:53.652335Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T17:47:41.964Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.4.0.16", }, { status: "affected", version: "6.4.0.17", }, { status: "affected", version: "6.4.0.18", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.6.7.1", }, { status: "affected", version: "6.6.7.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.0.6", }, { status: "affected", version: "7.0.6.1", }, { status: "affected", version: "7.0.6.2", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.1.0.3", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.1", }, { status: "affected", version: "7.2.2", }, { status: "affected", version: "7.2.0.1", }, { status: "affected", version: "7.2.3", }, { status: "affected", version: "7.2.3.1", }, { status: "affected", version: "7.2.4", }, { status: "affected", version: "7.2.4.1", }, { status: "affected", version: "7.2.5", }, { status: "affected", version: "7.2.5.1", }, { status: "affected", version: "7.2.6", }, { status: "affected", version: "7.2.7", }, { status: "affected", version: "7.2.5.2", }, { status: "affected", version: "7.2.8", }, { status: "affected", version: "7.2.8.1", }, { status: "affected", version: "7.3.0", }, { status: "affected", version: "7.3.1", }, { status: "affected", version: "7.3.1.1", }, { status: "affected", version: "7.3.1.2", }, { status: "affected", version: "7.4.0", }, { status: "affected", version: "7.4.1", }, { status: "affected", version: "7.4.1.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-23T17:29:39.644Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-dhJxQYZs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], source: { advisory: "cisco-sa-fmc-xss-dhJxQYZs", defects: [ "CSCwi78593", "CSCwi78594", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20372", datePublished: "2024-10-23T17:29:39.644Z", dateReserved: "2023-11-08T15:08:07.654Z", dateUpdated: "2024-10-24T17:47:41.964Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20740
Vulnerability from cvelistv5
Published
2022-05-03 03:16
Modified
2024-11-06 16:19
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center 6.1.0 |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.239Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20740", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:58:41.093839Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:19:18.168Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center 6.1.0", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-04-27T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-80", description: "CWE-80", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-03T03:16:07", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT", }, ], source: { advisory: "cisco-sa-fmc-xss-SfpEcvGT", defect: [ [ "CSCwa40223", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-04-27T16:00:00", ID: "CVE-2022-20740", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center 6.1.0", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-80", }, ], }, ], }, references: { reference_data: [ { name: "20220427 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT", }, ], }, source: { advisory: "cisco-sa-fmc-xss-SfpEcvGT", defect: [ [ "CSCwa40223", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20740", datePublished: "2022-05-03T03:16:07.514542Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:19:18.168Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-34749
Vulnerability from cvelistv5
Published
2021-08-18 19:40
Modified
2024-11-07 22:03
Severity ?
EPSS score ?
Summary
A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T00:19:48.253Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210818 Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-34749", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:54:31.391647Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T22:03:41.730Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Web Security Appliance (WSA)", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-08-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-19T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210818 Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN", }, { name: "[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { name: "DSA-5354", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5354", }, ], source: { advisory: "cisco-sa-sni-data-exfil-mFgzXqLN", defect: [ [ "CSCvy50873", "CSCvy64824", "CSCvy76771", ], ], discovery: "INTERNAL", }, title: "Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-34749", datePublished: "2021-08-18T19:40:38.750163Z", dateReserved: "2021-06-15T00:00:00", dateUpdated: "2024-11-07T22:03:41.730Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0278
Vulnerability from cvelistv5
Published
2018-05-02 22:00
Modified
2024-11-29 15:11
Severity ?
EPSS score ?
Summary
A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104122 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Firepower System Software |
Version: Cisco Firepower System Software |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:14.686Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", }, { name: "104122", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104122", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0278", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:38:10.585241Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T15:11:49.497Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower System Software", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Firepower System Software", }, ], }, ], datePublic: "2018-05-02T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-10T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", }, { name: "104122", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104122", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0278", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower System Software", version: { version_data: [ { version_value: "Cisco Firepower System Software", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", }, { name: "104122", refsource: "BID", url: "http://www.securityfocus.com/bid/104122", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0278", datePublished: "2018-05-02T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T15:11:49.497Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3557
Vulnerability from cvelistv5
Published
2020-10-21 18:41
Modified
2024-11-13 17:45
Severity ?
EPSS score ?
Summary
A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.937Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3557", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:12:10.389166Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:45:42.696Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-10-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-295", description: "CWE-295", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T18:41:23", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh", }, ], source: { advisory: "cisco-sa-fmc-dos-3WymYWKh", defect: [ [ "CSCvt54267", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-10-21T16:00:00", ID: "CVE-2020-3557", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.3", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-295", }, ], }, ], }, references: { reference_data: [ { name: "20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh", }, ], }, source: { advisory: "cisco-sa-fmc-dos-3WymYWKh", defect: [ [ "CSCvt54267", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3557", datePublished: "2020-10-21T18:41:23.789693Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:45:42.696Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20831
Vulnerability from cvelistv5
Published
2022-11-10 17:38
Modified
2024-08-03 02:24
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.6.7 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 Version: 7.2.0 Version: 7.2.0.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.934Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.6.7", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, { status: "affected", version: "7.2.0", }, { status: "affected", version: "7.2.0.1", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:07.701Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xss-LATZYzxs", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], source: { advisory: "cisco-sa-fmc-xss-LATZYzxs", defects: [ "CSCwb01983", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20831", datePublished: "2022-11-10T17:38:26.217Z", dateReserved: "2021-11-02T13:28:29.177Z", dateUpdated: "2024-08-03T02:24:49.934Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20938
Vulnerability from cvelistv5
Published
2022-11-10 17:42
Modified
2024-10-25 16:04
Severity ?
EPSS score ?
Summary
A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.
This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.3 Version: 6.2.3.4 Version: 6.2.3.5 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.9 Version: 6.2.3.10 Version: 6.2.3.11 Version: 6.2.3.12 Version: 6.2.3.13 Version: 6.2.3.14 Version: 6.2.3.15 Version: 6.2.3.8 Version: 6.2.3.16 Version: 6.2.3.17 Version: 6.2.3.18 Version: 6.4.0 Version: 6.4.0.1 Version: 6.4.0.3 Version: 6.4.0.2 Version: 6.4.0.4 Version: 6.4.0.5 Version: 6.4.0.6 Version: 6.4.0.7 Version: 6.4.0.8 Version: 6.4.0.9 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.4.0.12 Version: 6.4.0.13 Version: 6.4.0.14 Version: 6.4.0.15 Version: 6.6.0 Version: 6.6.0.1 Version: 6.6.1 Version: 6.6.3 Version: 6.6.4 Version: 6.6.5 Version: 6.6.5.1 Version: 6.6.5.2 Version: 6.7.0 Version: 6.7.0.1 Version: 6.7.0.2 Version: 6.7.0.3 Version: 7.0.0 Version: 7.0.0.1 Version: 7.0.1 Version: 7.0.1.1 Version: 7.0.2 Version: 7.0.2.1 Version: 7.0.3 Version: 7.0.4 Version: 7.1.0 Version: 7.1.0.1 Version: 7.1.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:58.641Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-fmc-xxe-MzPC4bYd", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20938", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:46.014519Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:04:24.395Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "6.2.3", }, { status: "affected", version: "6.2.3.1", }, { status: "affected", version: "6.2.3.2", }, { status: "affected", version: "6.2.3.3", }, { status: "affected", version: "6.2.3.4", }, { status: "affected", version: "6.2.3.5", }, { status: "affected", version: "6.2.3.6", }, { status: "affected", version: "6.2.3.7", }, { status: "affected", version: "6.2.3.9", }, { status: "affected", version: "6.2.3.10", }, { status: "affected", version: "6.2.3.11", }, { status: "affected", version: "6.2.3.12", }, { status: "affected", version: "6.2.3.13", }, { status: "affected", version: "6.2.3.14", }, { status: "affected", version: "6.2.3.15", }, { status: "affected", version: "6.2.3.8", }, { status: "affected", version: "6.2.3.16", }, { status: "affected", version: "6.2.3.17", }, { status: "affected", version: "6.2.3.18", }, { status: "affected", version: "6.4.0", }, { status: "affected", version: "6.4.0.1", }, { status: "affected", version: "6.4.0.3", }, { status: "affected", version: "6.4.0.2", }, { status: "affected", version: "6.4.0.4", }, { status: "affected", version: "6.4.0.5", }, { status: "affected", version: "6.4.0.6", }, { status: "affected", version: "6.4.0.7", }, { status: "affected", version: "6.4.0.8", }, { status: "affected", version: "6.4.0.9", }, { status: "affected", version: "6.4.0.10", }, { status: "affected", version: "6.4.0.11", }, { status: "affected", version: "6.4.0.12", }, { status: "affected", version: "6.4.0.13", }, { status: "affected", version: "6.4.0.14", }, { status: "affected", version: "6.4.0.15", }, { status: "affected", version: "6.6.0", }, { status: "affected", version: "6.6.0.1", }, { status: "affected", version: "6.6.1", }, { status: "affected", version: "6.6.3", }, { status: "affected", version: "6.6.4", }, { status: "affected", version: "6.6.5", }, { status: "affected", version: "6.6.5.1", }, { status: "affected", version: "6.6.5.2", }, { status: "affected", version: "6.7.0", }, { status: "affected", version: "6.7.0.1", }, { status: "affected", version: "6.7.0.2", }, { status: "affected", version: "6.7.0.3", }, { status: "affected", version: "7.0.0", }, { status: "affected", version: "7.0.0.1", }, { status: "affected", version: "7.0.1", }, { status: "affected", version: "7.0.1.1", }, { status: "affected", version: "7.0.2", }, { status: "affected", version: "7.0.2.1", }, { status: "affected", version: "7.0.3", }, { status: "affected", version: "7.0.4", }, { status: "affected", version: "7.1.0", }, { status: "affected", version: "7.1.0.1", }, { status: "affected", version: "7.1.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.\r\n\r This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-611", description: "Improper Restriction of XML External Entity Reference", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:17.407Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-fmc-xxe-MzPC4bYd", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd", }, ], source: { advisory: "cisco-sa-fmc-xxe-MzPC4bYd", defects: [ "CSCwb53694", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20938", datePublished: "2022-11-10T17:42:50.289Z", dateReserved: "2021-11-02T13:28:29.193Z", dateUpdated: "2024-10-25T16:04:24.395Z", requesterUserId: "4087f8c1-b21c-479b-99df-de23cb76b743", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15280
Vulnerability from cvelistv5
Published
2019-10-16 18:36
Modified
2024-11-21 19:06
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:42:03.795Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191016 Cisco Firepower Management Center Software Stored Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-15280", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:55:59.231923Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:06:59.043Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-16T18:36:45", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191016 Cisco Firepower Management Center Software Stored Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss", }, ], source: { advisory: "cisco-sa-20191016-fpwr-xss", defect: [ [ "CSCvq55915", "CSCvq55919", "CSCvq55929", "CSCvq55933", "CSCvq55938", "CSCvq55941", "CSCvq55946", "CSCvq55958", "CSCvq55967", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Software Stored Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-16T16:00:00-0700", ID: "CVE-2019-15280", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Software Stored Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20191016 Cisco Firepower Management Center Software Stored Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss", }, ], }, source: { advisory: "cisco-sa-20191016-fpwr-xss", defect: [ [ "CSCvq55915", "CSCvq55919", "CSCvq55929", "CSCvq55933", "CSCvq55938", "CSCvq55941", "CSCvq55946", "CSCvq55958", "CSCvq55967", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-15280", datePublished: "2019-10-16T18:36:45.621198Z", dateReserved: "2019-08-20T00:00:00", dateUpdated: "2024-11-21T19:06:59.043Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3307
Vulnerability from cvelistv5
Published
2020-05-06 16:42
Modified
2024-11-15 17:22
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to write arbitrary entries to the log file on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send incorrect information to the system log on the affected system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.218Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200506 Cisco Firepower Management Center Arbitrary Log File Write Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3307", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:21:24.488931Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:22:25.387Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-05-06T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to write arbitrary entries to the log file on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send incorrect information to the system log on the affected system.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-06T16:42:34", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200506 Cisco Firepower Management Center Arbitrary Log File Write Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE", }, ], source: { advisory: "cisco-sa-alfo-tHwFDmTE", defect: [ [ "CSCvh20053", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Arbitrary Log File Write Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-05-06T16:00:00-0700", ID: "CVE-2020-3307", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Arbitrary Log File Write Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to write arbitrary entries to the log file on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send incorrect information to the system log on the affected system.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200506 Cisco Firepower Management Center Arbitrary Log File Write Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE", }, ], }, source: { advisory: "cisco-sa-alfo-tHwFDmTE", defect: [ [ "CSCvh20053", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3307", datePublished: "2020-05-06T16:42:34.570642Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:22:25.387Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1238
Vulnerability from cvelistv5
Published
2021-01-13 21:17
Modified
2024-11-12 20:48
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.147Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1238", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:55:04.180987Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-12T20:48:03.296Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Firepower Management Center", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-01-13T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T21:17:13", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], source: { advisory: "cisco-sa-fmc-stored-xss-djKfCzf2", defect: [ [ "CSCvt48601", "CSCvt99020", ], ], discovery: "INTERNAL", }, title: "Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-01-13T16:00:00", ID: "CVE-2021-1238", STATE: "PUBLIC", TITLE: "Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Firepower Management Center", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "4.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20210113 Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], }, source: { advisory: "cisco-sa-fmc-stored-xss-djKfCzf2", defect: [ [ "CSCvt48601", "CSCvt99020", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1238", datePublished: "2021-01-13T21:17:13.396003Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-12T20:48:03.296Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2015-12-15 05:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.", }, { lang: "es", value: "Cisco FirePOWER Management Center 5.4.1.3, 6.0.0 y 6.0.1 proporciona respuestas detalladas a las solicitudes de los archivos de ayuda, lo que permite a atacantes remotos obtener información de la versión potencialmente sensible mediante la lectura de un campo no especificado, también conocido como Bug ID CSCux37061.", }, ], id: "CVE-2015-6411", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-12-15T05:59:06.857", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/78740", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/78740", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-04-18 01:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to access a report containing malicious content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions 6.2.3, 6.3.0, and 6.4.0 are affected.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/107995 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107995 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to access a report containing malicious content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions 6.2.3, 6.3.0, and 6.4.0 are affected.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Firepower Management Center (FMC) de Cisco, podría permitir que un atacante identificado y remoto realizara un ataque de tipo cross site scripting (XSS) contra un usuario de la interfaz de administración basada en web de un Sistema. La vulnerabilidad se debe a la insuficiente comprobación de la entrada proporcionada por el usuario en la interfaz de administración basada en web del sistema afectado. Un atacante podría aprovechar esta vulnerabilidad persuadiendo a un usuario para acceder a un informe que contiene contenido malicioso. Una operación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en navegador. Las versiones 6.2.3, 6.3.0 y 6.4.0 se ven afectadas.", }, ], id: "CVE-2019-1802", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-04-18T01:29:02.797", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107995", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107995", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 18:15
Modified
2024-11-26 16:09
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "D58D7217-F6F5-4B58-B59C-E5C8781C87A9", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "5156C270-7E41-4D2E-B051-F35563EA4402", versionEndIncluding: "6.4.0.17", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "BCDEBE63-3174-4BBC-82DE-E8E25C818E30", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "1110632C-526F-4025-A7BE-0CF9F37E5F9E", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "3F51D1A7-A702-4071-85D8-7C77CEB23955", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "F5F30710-F91A-4A7B-AB06-EE49525E6F04", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "90854884-399A-465B-ACB7-E493B8D39041", versionEndIncluding: "7.2.3", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.", }, { lang: "es", value: "Una vulnerabilidad en los mecanismos de comunicación entre dispositivos entre los dispositivos que ejecutan el software Cisco Firepower Threat Defense (FTD) y los dispositivos que ejecutan el software Cisco Firepower Management (FMC) podría permitir que un atacante local autenticado ejecute comandos arbitrarios con permisos de root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad accediendo al modo experto de un dispositivo afectado y enviando comandos específicos a un sistema conectado. Un exploit exitoso podría permitir al atacante ejecutar código arbitrario en el contexto de un dispositivo FMC si el atacante tiene privilegios administrativos en un dispositivo FTD asociado. Alternativamente, un exploit exitoso podría permitir al atacante ejecutar código arbitrario en el contexto de un dispositivo FTD si el atacante tiene privilegios administrativos en un dispositivo FMC asociado.", }, ], id: "CVE-2023-20063", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T18:15:08.967", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-94", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-16 17:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic. Cisco Bug IDs: CSCvh70130.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104726 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1041283 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104726 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041283 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2.1 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic. Cisco Bug IDs: CSCvh70130.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar omita una política de archivos que esté configurada para bloquear la transferencia de archivos a un sistema afectado mediante FTP. La vulnerabilidad existe debido a que el software afectado gestiona incorrectamente las conexiones de control FTP. Un atacante podría explotar esta vulnerabilidad enviando una conexión FTP maliciosamente manipulada para transferir un archivo a un dispositivo afectado. Un exploit exitoso podría permitir que el atacante omita una política de archivos configurada para aplicar la subida Block con acción reset al tráfico FTP. Cisco Bug IDs: CSCvh70130.", }, ], id: "CVE-2018-0383", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-16T17:29:00.597", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104726", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041283", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104726", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-01-23 23:29
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/106714 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss | Vendor Advisory | |
psirt@cisco.com | https://www.exploit-db.com/exploits/46263/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106714 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/46263/ | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) contra un usuario de dicha interfaz en el software afectado. La vulnerabilidad se debe a la validación insuficiente de entrada de datos de parte del usuario en la interfaz de gestión web del software afectado. Un atacante podría explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace manipulado. Su explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz afectada o que pueda acceder a información sensible del navegador.", }, ], id: "CVE-2019-1642", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-01-23T23:29:00.527", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106714", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss", }, { source: "psirt@cisco.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46263/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106714", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46263/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-05-02 22:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of a Transport Layer Security (TLS) extension during TLS connection setup for the affected software. An attacker could exploit this vulnerability by sending a crafted TLS connection setup request to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg97808.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104096 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104096 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of a Transport Layer Security (TLS) extension during TLS connection setup for the affected software. An attacker could exploit this vulnerability by sending a crafted TLS connection setup request to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg97808.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar reinicie una instancia del motor de detección Snort en un dispositivo afectado y provoque una breve denegación de servicio (DoS) como consecuencia. Esta vulnerabilidad se debe a una gestión incorrecta de una extensión Transport Layer Security (TLS) durante la configuración de una conexión TLS para el software afectado. Un atacante podría explotar esta vulnerabilidad enviando petición de configuración de conexión TLS a un dispositivo afectado. Un exploit con éxito podría permitir que el atacante provoque el reinicio inesperado del motor de detección de Snort en el sistema afectado, lo que daría como resultado una condición de DoS temporal. Cisco Bug IDs: CSCvg97808.", }, ], id: "CVE-2018-0281", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-05-02T22:29:01.027", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104096", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104096", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-310", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-319", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "681AD618-9A3F-422B-96F0-BB6E38D9DE08", versionEndExcluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un sistema afectado. Las vulnerabilidades se presentan porque la interfaz de administración basada en web no comprueba apropiadamente la entrada suministrada por el usuario. Un atacante podría explotar estas vulnerabilidades persuadiendo a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2021-1238", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:20.757", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20386", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:07.257", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-10-27 19:15
Modified
2024-11-26 16:09
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | 2.9.14.0 | |
cisco | secure_firewall_management_center | 2.9.15 | |
cisco | secure_firewall_management_center | 2.9.16 | |
cisco | secure_firewall_management_center | 2.9.17 | |
cisco | unified_threat_defense | * | |
cisco | unified_threat_defense | * | |
cisco | unified_threat_defense | * | |
snort | snort | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "FAE65CB5-08E5-41B6-9AC0-02451C90E833", versionEndExcluding: "6.4.0.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "D042ED9F-3702-4959-AAA0-D98684EB4556", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "FDDF492B-BC61-4814-B05F-3F6CD07080F7", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*", matchCriteriaId: "6F41C382-C849-465C-AF77-0A787CA03BA7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "174C4020-E642-48F7-BCC5-884834D3EBBB", versionEndExcluding: "16.12.6", versionStartIncluding: "16.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "F4521953-E027-498C-8484-A4E76A737347", versionEndExcluding: "17.3.4a", versionStartIncluding: "17.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "3248706E-3F8C-4F74-900E-3302ACF2E716", versionEndExcluding: "17.4.2", versionStartIncluding: "17.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", matchCriteriaId: "7DEEA69A-4557-409E-A0EC-981F2C7C828A", versionEndExcluding: "2.9.18", versionStartIncluding: "2.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad en la forma en que el motor de detección Snort procesa el tráfico ICMP que podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una administración inapropiada de los recursos de memoria mientras el motor de detección Snort procesa paquetes ICMP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una serie de paquetes ICMP mediante un dispositivo afectado. Una explotación con éxito podría permitir al atacante agotar los recursos del dispositivo afectado, causando la recarga del mismo", }, ], id: "CVE-2021-40114", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-27T19:15:08.667", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web de Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado ejecutar comandos arbitrarios sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de entradas diseñadas hacia la Interfaz de Usuario web. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios dentro del dispositivo afectado.", }, ], id: "CVE-2019-12688", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.077", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-10-27 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "6208D84A-C7EE-4F9D-82B2-C3BD657A6B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "E12A7E1A-DD5F-4D24-B40C-9B6A4B06B7E6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "E80F6ABE-ED3A-4F37-91E7-102DB4B63BC4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.3:*:*:*:*:*:*:*", matchCriteriaId: "B03AFE63-7D90-4092-9AB0-E05531EB0412", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.4:*:*:*:*:*:*:*", matchCriteriaId: "C06AC416-34EE-4881-8CCE-7E5CDD185364", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.5:*:*:*:*:*:*:*", matchCriteriaId: "47D22E4A-D02B-48E7-86D9-2A05A07C8A54", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.6:*:*:*:*:*:*:*", matchCriteriaId: "8695C71C-53B3-49F6-9BDD-85A45762D9D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4_base:*:*:*:*:*:*:*", matchCriteriaId: "9B2E1AA9-8A80-489A-8A6F-E9034E7D2A82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AF40DB44-C213-466E-B473-B07B30A42B34", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0_base:*:*:*:*:*:*:*", matchCriteriaId: "554F229F-A0F5-4CA9-9778-5585E01ADF6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.", }, { lang: "es", value: "Una vulnerabilidad en el reensamblaje del motor de detección de paquetes HTTP para Cisco Firepower System Software en versiones anteriores a 6.0.1 podría permitir a un atacante remoto no autenticado provocar una condición de denegación de servicio (DoS) debido al reinicio inesperado del proceso Snort. La vulnerabilidad se debe al manejo incorrecto de un flujo de paquetes HTTP. Un atacante puede explotar esta vulnerabilidad mandado un flujo de paquetes HTTP manipulados al motor de detección en el dispositivo objetivo. Una explotación puede permitir al atacante provocar una condición DoS si el proceso Snort se reinicia y la inspección del tráfico se elude o el tráfico se cae.", }, ], id: "CVE-2016-6439", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-10-27T21:59:11.093", references: [ { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/93787", }, { source: "psirt@cisco.com", url: "http://www.securitytracker.com/id/1037061", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/93787", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1037061", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12683", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.780", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-05 20:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_services_software_for_asa:*:*:*:*:*:*:*:*", matchCriteriaId: "0A70505F-E716-439B-BE8C-B4CC3DF080E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "E102D5C4-D296-4F09-B4FA-62CD8E2E5CB1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "0BD5CFAE-5696-419C-B24E-7CF9E7EC7B92", versionEndIncluding: "2.9.12.15", versionStartIncluding: "2.9.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4DC81-DD37-46A6-8751-D0B4671E23BA", versionEndIncluding: "2.9.13.6", versionStartIncluding: "2.9.13", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "C37F0EAC-42D5-4D10-A5C8-6D975B7BF176", versionEndIncluding: "2.9.14.5", versionStartIncluding: "2.9.14.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.", }, { lang: "es", value: "Una vulnerabilidad en el componente de detección de protocolo del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido a la detección inapropiada del uso inicial de un protocolo en un puerto no estándar. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico sobre un puerto no estándar para el protocolo en uso por medio de un dispositivo afectado. Una explotación podría permitir al atacante omitir el filtrado y entregar peticiones maliciosas hacia los sistemas protegidos que de otra manera se bloquearían. Una vez que se detecta el flujo de protocolo inicial sobre el puerto no estándar, los flujos futuros sobre el puerto no estándar serán detectados con éxito y manejados según lo configurado mediante la política aplicada.", }, ], id: "CVE-2019-1980", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-05T20:15:11.690", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-08-18 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 4.10.3.9 | |
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0.4 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3.9:*:*:*:*:*:*:*", matchCriteriaId: "D17B44DA-B955-4171-BC60-EDEDD19B5274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "E80F6ABE-ED3A-4F37-91E7-102DB4B63BC4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.", }, { lang: "es", value: "La GUI basada en web en Cisco Firepower Management Center 4.x y 5.x en versiones anteriores a 5.3.1.2 y 5.4.x en versiones anteriores a 5.4.0.1 y Cisco Adaptive Security Appliance (ASA) Software en dispositivos 5500-X con FirePOWER Services 4.x y 5.x en versiones anteriores a 5.3.1.2 y 5.4.x en versiones anteriores a 5.4.0.1 permite a usuarios remotos autenticados ejecutar comandos arbitrarios como root a través de peticiones HTTP manipuladas, también conocido como Bug ID CSCur25513.", }, ], id: "CVE-2016-1457", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-08-18T19:59:01.410", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/92509", }, { source: "psirt@cisco.com", url: "http://www.securitytracker.com/id/1036642", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/92509", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1036642", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-08-08 08:15
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "0A0828FF-48F8-41FF-BCB9-DFA93B0E72A5", versionEndExcluding: "6.4.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.", }, { lang: "es", value: "Una vulnerabilidad en el motor de inspección del protocolo Secure Sockets Layer (SSL)/Transport Layer Security (TLS) del software Firepower Threat Defense (FTD) de Cisco, podría permitir a un atacante remoto no autenticado omitir las políticas de archivo configuradas en un sistema afectado. La vulnerabilidad es debido a errores cuando se manejan mensajes SSL/TLS específicos. Un atacante podría explotar esta vulnerabilidad enviando paquetes HTTP diseñados que fluirían por medio de un sistema afectado. Una explotación con éxito podría permitir al atacante omitir las políticas de archivos configuradas y entregar una carga maliciosa a la red protegida.", }, ], id: "CVE-2019-1970", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-08-08T08:15:12.960", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-02-03 07:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base. More Information: CSCvb95281. Known Affected Releases: 6.1.0 6.2.0. Known Fixed Releases: 6.1.0.1 6.2.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Policy deployment module of the Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to prevent deployment of a complete and accurate rule base. More Information: CSCvb95281. Known Affected Releases: 6.1.0 6.2.0. Known Fixed Releases: 6.1.0.1 6.2.0.", }, { lang: "es", value: "Una vulnerabilidad en el módulo de implementación de Políticas de Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado prevenga el despliegue de una base de reglas completa y precisa. Más información: CSCvb95281. Lanzamientos Afectados Conocidos: 6.1.0 6.2.0. Lanzamientos Reparados Conocidos: 6.1.0.1 6.2.0.", }, ], id: "CVE-2017-3809", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-02-03T07:59:00.687", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95941", }, { source: "psirt@cisco.com", url: "http://www.securitytracker.com/id/1037776", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95941", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1037776", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-10-05 14:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securitytracker.com/id/1041786 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041786 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | adaptive_security_appliance_software | 9.6.4 | |
cisco | adaptive_security_appliance_software | 9.8.2 | |
cisco | adaptive_security_appliance_software | 9.9.1 | |
cisco | adaptive_security_appliance_software | 9.9.1\(1\) |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4:*:*:*:*:*:*:*", matchCriteriaId: "FAC7A642-121A-4A8C-B055-0296EA5D6E10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*", matchCriteriaId: "EAF8B33E-0C95-467D-A865-0A234E69D0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1:*:*:*:*:*:*:*", matchCriteriaId: "3C50642A-B123-4503-9EBB-32CDB67E44D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "508C3996-CBC5-48DC-B84B-88A142CF7281", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en la implementación de Traffic Flow Confidentiality (TFC) en la funcionalidad IPsec en Cisco Adaptive Security Appliance (ASA) Software y Cisco Firepower Threat Defense (FTD) Software podría permitir que un atacante remoto no autenticado provoque que un dispositivo afectado se reinicie inesperadamente, lo que resulta en una denegación de servicio (DoS). La vulnerabilidad se debe a un error que podría ocurrir si el software afectado renegocia la clave de cifrado para un túnel IPsec cuando cierto tráfico TFC está en tránsito. Un atacante podría explotar esta vulnerabilidad enviando un flujo de tráfico TFC malicioso a través de un túnel IPsec establecido en un dispositivo afectado. Su explotación con éxito podría permitir que el atacante provoque el cierre inesperado de un proceso demonio en el dispositivo afectado, lo que provocará que el dispositivo se cierre inesperadamente y desemboque en una denegación de servicio (DoS).", }, ], id: "CVE-2018-15397", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-10-05T14:29:08.107", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041786", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041786", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-320", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_management_center | 7.4.0 | |
cisco | firepower_management_center | 7.4.1 | |
cisco | firepower_management_center | 7.4.1.1 | |
cisco | secure_firewall_management_center | 7.3.0 | |
cisco | secure_firewall_management_center | 7.3.1 | |
cisco | secure_firewall_management_center | 7.3.1.1 | |
cisco | secure_firewall_management_center | 7.3.1.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC), anteriormente Firepower Management Center Software, podría permitir que un atacante remoto autenticado lea archivos arbitrarios del sistema operativo subyacente. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un dispositivo afectado. Una explotación exitosa podría permitir al atacante leer archivos arbitrarios en el sistema operativo subyacente del dispositivo afectado. El atacante necesitaría credenciales de usuario válidas para aprovechar esta vulnerabilidad.", }, ], id: "CVE-2024-20379", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:06.553", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-36", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices.", }, { lang: "es", value: "Una vulnerabilidad en el servicio de licenciamiento de Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS). La vulnerabilidad es debido al manejo inapropiado de los valores de los recursos del sistema mediante el sistema afectado. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones maliciosas al sistema objetivo. Una explotación con éxito podría permitir el atacante causar que el sistema afectado dejara de responder, resultando en una condición de DoS e impediría la administración de dispositivos dependientes", }, ], id: "CVE-2020-3499", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:16.623", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC) Software, podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir a un atacante ejecutar un código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2020-3515", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:16.793", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-01-10 19:29
Modified
2024-11-26 16:09
Severity ?
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/106516 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106516 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.", }, { lang: "es", value: "Una vulnerabilidad en la característica de filtrado de acceso shell de Cisco Firepower Management Center (FMC), al emplearse junto con autenticación remota, podría permitir que un atacante remoto no autenticado provoque un gran uso del disco, lo que resulta en una condición de denegación de servicio (DoS). La vulnerabilidad ocurre debido a que la configuración del acceso shell, al emplearse con un tipo específico de autenticación remota, puede provocar que un archivo del sistema tenga escrituras no limitadas. Un atacante podría explotar esta vulnerabilidad enviando un flujo constante de peticiones de autenticación remota al aparato cuando se aplica la configuración específica. La explotación con éxito podría permitir que el atacante aumente el tamaño de un archivo de log del sistema para que consuma casi todo el espacio del disco. La falta de espacio disponible en el disco podría desembocar en una condición de denegación de servicio (DoS) en la que las funciones del aparato podrían operar de forma errónea, haciendo que el dispositivo sea inestable.", }, ], id: "CVE-2018-15458", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-01-10T19:29:00.517", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106516", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106516", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-02-03 07:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass. More Information: CSCvb93980. Known Affected Releases: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/95942 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95942 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.1 | |
cisco | secure_firewall_management_center | 6.1.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to maliciously bypass the appliance's ability to block certain web content, aka a URL Bypass. More Information: CSCvb93980. Known Affected Releases: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.", }, { lang: "es", value: "Una vulnerabilidad en Cisco Firepower System Software podría permitir a un atacante remoto no autenticado eludir maliciosamente la capacidad del aparato para bloquear ciertos contenidos web, vulnerabilidad también conocida como un URL Bypass. Más Información: CSCvb93980. Lanzamientos Afectados Conocidos: 5.3.0 5.4.0 6.0.0 6.0.1 6.1.0.", }, ], id: "CVE-2017-3814", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-02-03T07:59:00.780", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95942", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95942", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20872", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:28.720", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Stored Cross-Site Scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20831", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:23.537", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-29 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "634D4E3D-4FAB-46BC-9D9D-E6AFCFB26B17", versionEndIncluding: "6.4.0.11", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3B093C12-8118-45D4-B044-621E5228BB9F", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4EF7D3CA-AA84-46D8-9386-C8672FCDB090", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2021-1456", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T18:15:09.080", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12680", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.500", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-10-06 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.", }, { lang: "es", value: "La consola web en Cisco Firepower Management Center 6.0.1 permite a usuarios remotos autenticados leer archivos arbitrarios a través de parámetros manipulados, vulnerabilidad también conocida como Bug ID CSCva30376.", }, ], id: "CVE-2016-6435", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-10-06T10:59:16.460", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/93421", }, { source: "psirt@cisco.com", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "psirt@cisco.com", url: "https://www.exploit-db.com/exploits/40464/", }, { source: "psirt@cisco.com", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/93421", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/40464/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20836", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:24.860", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-08-23 02:11
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc | Vendor Advisory | |
psirt@cisco.com | http://www.securityfocus.com/bid/92510 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92510 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 4.10.3 | |
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.3.0.2 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", matchCriteriaId: "8AA27341-2B4C-4FBE-B9BC-7005CDBA3FB5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "6208D84A-C7EE-4F9D-82B2-C3BD657A6B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518.", }, { lang: "es", value: "Vulnerabilidad XSS en Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1 y 5.4.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de parámetros no especificados, también conocido como Bug IDs CSCur25508 y CSCur25518.", }, ], id: "CVE-2016-6365", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-08-23T02:11:04.960", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/92510", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/92510", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "CB1B5DAC-CE54-43E4-89F6-6DFD7A65C8EA", versionEndExcluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*", matchCriteriaId: "6F41C382-C849-465C-AF77-0A787CA03BA7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*", matchCriteriaId: "80AD91C6-B7E3-48AC-8A51-3C05FE2659AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "408B880A-50EF-4246-BF38-213D812BD0BE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "72B91784-38A9-4A2A-AA92-8AB558924BBD", versionEndExcluding: "17.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "BF8B0B49-2C99-410B-B011-5B821C5992FB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*", matchCriteriaId: "9510E97A-FD78-43C6-85BC-223001ACA264", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", matchCriteriaId: "715F9721-D26C-4086-873F-837D0FCAF1A5", versionEndExcluding: "2.9.17", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7BCF0950-162A-4E47-BA2A-43701EA7782E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF993C79-4C7F-4B99-B8BB-3996C4F3D8F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A8AAC-9813-45C9-8C69-0579C0ADA0C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "24AB6590-8775-4744-BF84-892F0BD10225", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77C0B39F-AE49-44D7-8951-9DB0464FE43B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8398495B-47DB-4A16-AF8C-053685D5DD9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90EC4BA2-0FA2-4841-9AB1-3FC92D22530D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A685A8D6-9B97-46B3-8087-0D44EE0D65AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad con TCP Fast Open (TFO) cuando se usan en conjunto con el motor de detección Snort que podría permitir a un atacante remoto no autenticado omitir una política de archivos configurada para HTTP. La vulnerabilidad es debido a la detección incorrecta de la carga útil HTTP si está contenida al menos parcialmente dentro del protocolo de enlace de la conexión TFO. Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes TFO diseñados con una carga útil HTTP a través de un dispositivo afectado. Una explotación con éxito podría permitir al atacante omitir la política de archivos configurada para paquetes HTTP y entregar una carga útil maliciosa.", }, ], id: "CVE-2021-1224", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:20.410", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-10-27 19:15
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | 2.9.12 | |
cisco | secure_firewall_management_center | 2.9.14.0 | |
cisco | secure_firewall_management_center | 2.9.16 | |
cisco | secure_firewall_management_center | 2.9.17 | |
cisco | secure_firewall_management_center | 2.9.18 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "17F461B5-E600-4C81-BA3C-1DBC90D4D438", versionEndExcluding: "6.4.0.13", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "EDF402F7-DFC5-4A83-A209-9905AE54C49F", versionEndExcluding: "6.6.5.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "98DEDDAB-B8C5-4753-A208-94638E694FC1", versionEndExcluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "7B2F537A-A488-45B6-AD4B-48B7064AE84C", versionEndExcluding: "7.0.1", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.12:*:*:*:*:*:*:*", matchCriteriaId: "8532C989-889B-4DEE-8687-6C67F173E50D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*", matchCriteriaId: "6F41C382-C849-465C-AF77-0A787CA03BA7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*", matchCriteriaId: "80AD91C6-B7E3-48AC-8A51-3C05FE2659AB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.", }, { lang: "es", value: "Múltiples vulnerabilidades en la inspección de la carga útil del tráfico del Protocolo Industrial Ethernet (ENIP) para el software Cisco Firepower Threat Defense (FTD) podrían permitir a un atacante remoto no autenticado omitir las reglas configuradas para el tráfico ENIP. Estas vulnerabilidades son debido al procesamiento incompleto durante la inspección profunda de paquetes para los paquetes ENIP. Un atacante podría explotar estas vulnerabilidades enviando un paquete ENIP diseñado a la interfaz objetivo. Una explotación con éxito podría permitir al atacante omitir el control de acceso configurado y las políticas de intrusión que deberían activarse para el paquete ENIP", }, ], id: "CVE-2021-34754", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-27T19:15:07.820", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20843", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:27.437", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the configuration of the Pluggable Authentication Module (PAM) used in Cisco Firepower Threat Defense (FTD) Software, Cisco Firepower Management Center (FMC) Software, and Cisco FXOS Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper resource management in the context of user session management. An attacker could exploit this vulnerability by connecting to an affected system and performing many simultaneous successful Secure Shell (SSH) logins. A successful exploit could allow the attacker to exhaust system resources and cause the device to reload, resulting in a DoS condition. To exploit this vulnerability, the attacker needs valid user credentials on the system.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_9300_firmware:r114:*:*:*:*:*:*:*", matchCriteriaId: "7BAFB031-B555-4291-94A7-B624CDDA6E22", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_9300_firmware:r241:*:*:*:*:*:*:*", matchCriteriaId: "D9204F1F-5094-40F5-88C2-A709E599FFE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "07DAFDDA-718B-4B69-A524-B0CEB80FE960", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", matchCriteriaId: "C8D9C558-2EDE-493B-B473-30686B1F5F1F", versionEndIncluding: "2.2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", matchCriteriaId: "3D69E67A-C3CE-4714-9DFF-6D4FAD4FA3BB", versionEndExcluding: "2.3.1.155", versionStartIncluding: "2.3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", matchCriteriaId: "D4B07EAA-8923-4AE7-BB3E-578955C06251", versionEndExcluding: "2.6.1.131", versionStartIncluding: "2.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "BC5F3455-0918-4F29-987F-376FF74F8CE0", versionEndIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "3C50547D-4EEE-40B2-80F3-DC0059DF5B27", versionEndExcluding: "6.2.3.14", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "82A4999E-1D1C-45CD-BF8C-C08D9AB7DA0E", versionEndIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "9BB17BB1-4542-47AF-AE44-FF8A27BC1F86", versionEndExcluding: "6.2.3.14", versionStartIncluding: "6.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "E6F79864-CA70-4192-AC2C-E174DF3F25B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_2100:-:*:*:*:*:*:*:*", matchCriteriaId: "D23A26EF-5B43-437C-A962-4FC69D8A0FF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "BC5F3455-0918-4F29-987F-376FF74F8CE0", versionEndIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "8F67688A-E56F-49A6-955E-5D541E96E5F7", versionEndExcluding: "6.2.2.5", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "2B9EB1B7-F821-41A0-9282-8F9D698DF0AE", versionEndExcluding: "6.2.3.7", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "82A4999E-1D1C-45CD-BF8C-C08D9AB7DA0E", versionEndIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "9BB17BB1-4542-47AF-AE44-FF8A27BC1F86", versionEndExcluding: "6.2.3.14", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FA4116CE-6AAC-4D3F-AF7F-B4C1B9E6A242", versionEndExcluding: "6.2.3.7", versionStartIncluding: "6.2.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the configuration of the Pluggable Authentication Module (PAM) used in Cisco Firepower Threat Defense (FTD) Software, Cisco Firepower Management Center (FMC) Software, and Cisco FXOS Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper resource management in the context of user session management. An attacker could exploit this vulnerability by connecting to an affected system and performing many simultaneous successful Secure Shell (SSH) logins. A successful exploit could allow the attacker to exhaust system resources and cause the device to reload, resulting in a DoS condition. To exploit this vulnerability, the attacker needs valid user credentials on the system.", }, { lang: "es", value: "Una vulnerabilidad en la configuración del Pluggable Authentication Module (PAM) utilizado en el Software Cisco Firepower Threat Defense (FTD), el Software Cisco Firepower Management Center (FMC) y el Software Cisco FXOS, podría permitir a un atacante remoto autenticado causar una condición de denegación de servicio (DoS). La vulnerabilidad es debido a la administración de recursos inapropiada en el contexto de la administración de sesión del usuario. Un atacante podría explotar esta vulnerabilidad mediante la conexión a un sistema afectado y realizando muchos inicios de sesión con éxito de Secure Shell (SSH) simultáneos. Una explotación con éxito podría permitir al atacante agotar los recursos del sistema y causar que el dispositivo se recargue, resultando en una condición DoS. Para explotar esta vulnerabilidad, el atacante necesita credenciales de usuario válidas en el sistema.", }, ], id: "CVE-2019-12700", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.1, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.810", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | 6.6.0 | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "9D27DE97-510A-4761-8184-6940745B54E2", versionEndExcluding: "6.3.0.6", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "53C69C8B-5A19-4613-8861-683CF21806B7", versionEndExcluding: "6.4.0.10", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "3ED0E59C-146C-494F-AD46-F6FB43F9C575", versionEndExcluding: "6.5.0.5", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "DCD69468-8067-4A5D-B2B0-EC510D889AA0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad multi-instance de Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante local autenticado escapar del contenedor para su instancia Cisco FTD y ejecutar comandos con privilegios root en el espacio de nombres del host. El atacante debe tener credenciales válidas en el dispositivo. La vulnerabilidad se presenta porque un archivo de configuración que es usado en el inicio del contenedor no posee protecciones suficientes. Un atacante podría explotar esta vulnerabilidad mediante la modificación de un archivo de configuración de contenedor específico en el sistema de archivos subyacente. Una explotación con éxito podría permitir a un atacante ejecutar comandos con privilegios root dentro del espacio de nombres del host. Esto podría permitir que el atacante afecte a otras instancias de Cisco FTD en ejecución o al dispositivo host Cisco FXOS", }, ], id: "CVE-2020-3514", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:16.717", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-216", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-03 16:29
Modified
2024-11-26 16:09
Severity ?
6.7 (Medium) - CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "482F5B2F-B90E-4042-AF0D-FC1DCEF79030", versionEndExcluding: "6.2.3.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, { lang: "es", value: "Una vulnerabilidad en la CLI del software Firepower Threat Defense (FTD) de Cisco, podría permitir a un atacante local identificado ejecutar un ataque de inyección de comando. La vulnerabilidad es debido a la insuficiente comprobación de entrada. Un atacante podría aprovechar esta vulnerabilidad al inyectar comandos dentro de argumentos para un comando específico. Una operación con éxito podría permitir al atacante ejecutar comandos con privilegios root.", }, ], id: "CVE-2019-1699", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-03T16:29:00.303", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Stored Cross-Site Scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información sensible basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20832", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:23.777", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-07 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/100640 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100640 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*", matchCriteriaId: "DAEC54E5-91D8-48AB-A890-5841A158839F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.", }, { lang: "es", value: "Una vulnerabilidad en el framework web de Cisco Firepower Management Center podría permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) contra un usuario de la interfaz web del software afectado. La vulnerabilidad se debe a la validación insuficiente de entrada de datos de parte del usuario por parte del software afectado. Una explotación con éxito de esta vulnerabilidad podría permitir al atacante que ejecute código arbitrario en el contexto del sistema afectado. Cisco Bug IDs: CSCvc38983.", }, ], id: "CVE-2017-12221", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-07T21:29:00.490", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100640", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100640", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E38E1045-F5AF-4EA0-B541-EDE61A190170", versionEndExcluding: "6.3.0.5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "333DACD6-9D85-47BC-8945-34514D45B778", versionEndExcluding: "6.4.0.4", versionStartIncluding: "6.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web de Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado inyectar comandos arbitrarios que son ejecutados con los privilegios del usuario root del sistema operativo subyacente. La vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por el usuario en la Interfaz de Usuario web. Un atacante podría explotar esta vulnerabilidad mediante el envío de una entrada diseñada en la Interfaz de Usuario web. Una explotación con éxito podría permitir a un atacante ejecutar comandos arbitrarios en el dispositivo con todos los privilegios de root.", }, ], id: "CVE-2019-12690", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.203", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-29 18:15
Modified
2024-11-26 16:09
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "15623423-7EBA-488F-8B44-63A97BEA5039", versionEndExcluding: "6.4.0.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3B093C12-8118-45D4-B044-621E5228BB9F", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4EF7D3CA-AA84-46D8-9386-C8672FCDB090", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en un mecanismo de control de acceso del software Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado acceder a servicios más allá del alcance de su autorización. Esta vulnerabilidad es debido a una aplicación insuficiente del control de acceso en el software afectado. Un atacante podría explotar esta vulnerabilidad al acceder directamente a los servicios internos de un dispositivo afectado. Una explotación con éxito podría permitir al atacante sobrescribir las políticas y afectar la configuración y el funcionamiento del dispositivo afectado", }, ], id: "CVE-2021-1477", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T18:15:09.233", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20835", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:24.533", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "CB1B5DAC-CE54-43E4-89F6-6DFD7A65C8EA", versionEndExcluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "72B91784-38A9-4A2A-AA92-8AB558924BBD", versionEndExcluding: "17.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "BF8B0B49-2C99-410B-B011-5B821C5992FB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*", matchCriteriaId: "9510E97A-FD78-43C6-85BC-223001ACA264", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", matchCriteriaId: "715F9721-D26C-4086-873F-837D0FCAF1A5", versionEndExcluding: "2.9.17", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad en el motor de detección de Snort que podría permitir a un atacante remoto no autenticado omita una política de archivos configurada para HTTP. La vulnerabilidad es debido al manejo incorrecto de un encabezado de rango HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes HTTP diseñados a través de un dispositivo afectado. Una explotación con éxito podría permitir al atacante omitir la política de archivos configurada para paquetes HTTP y entregar una carga útil maliciosa.", }, ], id: "CVE-2021-1223", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:20.317", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2023-20005", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:10.847", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20905", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:29.250", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.2.3.10 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data.", }, { lang: "es", value: "Una vulnerabilidad en la configuración de la política de aplicación del Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto no autenticado conseguir acceso de lectura no autorizado para datos confidenciales sobre un dispositivo afectado. La vulnerabilidad es debido a una identificación insuficiente de la aplicación. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico diseñado hacia un dispositivo afectado. Una explotación con éxito podría permitir a un atacante conseguir acceso de lectura no autorizada a datos confidenciales.", }, ], id: "CVE-2020-3312", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.667", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-732", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-07 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/100639 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100639 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*", matchCriteriaId: "DAEC54E5-91D8-48AB-A890-5841A158839F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Cisco Firepower Management Center podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en un dispositivo afectado. La vulnerabilidad se debe a la validación insuficiente de entrada de datos de parte del usuario en la interfaz de gestión web de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace manipulado. Si se explota esta vulnerabilidad con éxito, el atacante podría ejecutar código de script arbitrario en el contexto de la interfaz o permitir que el atacante pueda acceder a información confidencial del navegador. Cisco Bug IDs: CSCvc50771.", }, ], id: "CVE-2017-12220", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-07T21:29:00.443", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100639", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100639", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 18:15
Modified
2024-11-26 16:09
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The attacker would need valid device credentials but does not require administrator privileges to exploit this vulnerability. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device including the underlying operating system which could also affect the availability of the device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The attacker would need valid device credentials but does not require administrator privileges to exploit this vulnerability. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device including the underlying operating system which could also affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema operativo subyacente. El atacante necesitaría credenciales de dispositivo válidas, pero no necesitaría privilegios de administrador para aprovechar esta vulnerabilidad. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario para ciertas opciones de configuración. Un atacante podría aprovechar estas vulnerabilidades utilizando entradas manipuladas dentro de la GUI de configuración del dispositivo. Un exploit exitoso podría permitir al atacante ejecutar comandos arbitrarios en el dispositivo, incluido el sistema operativo subyacente, lo que también podría afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2023-20219", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T18:15:09.460", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 7.0.0 | |
cisco | secure_firewall_management_center | 7.0.0.1 | |
cisco | secure_firewall_management_center | 7.0.1 | |
cisco | secure_firewall_management_center | 7.0.1.1 | |
cisco | secure_firewall_management_center | 7.0.2 | |
cisco | secure_firewall_management_center | 7.0.2.1 | |
cisco | secure_firewall_management_center | 7.0.3 | |
cisco | secure_firewall_management_center | 7.0.4 | |
cisco | secure_firewall_management_center | 7.1.0 | |
cisco | secure_firewall_management_center | 7.1.0.1 | |
cisco | secure_firewall_management_center | 7.1.0.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el Sistema Operativo subyacente. La vulnerabilidad se debe a una validación insuficiente de los parámetros proporcionados por el usuario para algunas API de endpoint. Un atacante podría aprovechar esta vulnerabilidad enviando información manipulada a un endpoint API afectado. Un exploit exitoso podría permitir a un atacante ejecutar comandos arbitrarios en el dispositivo con privilegios bajos del sistema. Para aprovechar esta vulnerabilidad con éxito, un atacante necesitaría credenciales válidas para un usuario con permisos de dispositivo: de forma predeterminada, solo las cuentas de usuario Administradores, Aprobadores de Seguridad y Administradores de Red tienen estos permisos.", }, ], id: "CVE-2022-20926", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:32.467", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.4.0.16 | |
cisco | secure_firewall_management_center | 6.6.7.1 | |
cisco | secure_firewall_management_center | 7.0.5 | |
cisco | secure_firewall_management_center | 7.1.0.3 | |
cisco | secure_firewall_management_center | 7.2.0 | |
cisco | secure_firewall_management_center | 7.2.0.1 | |
cisco | secure_firewall_management_center | 7.2.1 | |
cisco | secure_firewall_management_center | 7.2.2 | |
cisco | secure_firewall_management_center | 7.2.3 | |
cisco | secure_firewall_management_center | 7.2.3.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2023-20041", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:10.917", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in Cisco Firepower Management Center could allow an authenticated, remote attacker to obtain user information. An attacker could use this information to perform reconnaissance. More Information: CSCvc10894. Known Affected Releases: 6.1.0.2 6.2.0. Known Fixed Releases: 6.2.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0.2 | |
cisco | secure_firewall_management_center | 6.2.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Cisco Firepower Management Center could allow an authenticated, remote attacker to obtain user information. An attacker could use this information to perform reconnaissance. More Information: CSCvc10894. Known Affected Releases: 6.1.0.2 6.2.0. Known Fixed Releases: 6.2.0.", }, { lang: "es", value: "Una vulnerabilidad en Cisco Firepower Management Center podría permitir a un atacante remoto autenticado obtener información del usuario. Un atacante podría usar esta información para realizar el reconocimiento. Más información: CSCvc10894. Versiones afectadas conocidas: 6.1.0.2 y 6.2.0. Versiones solucionadas conocidas: 6.2.0.", }, ], id: "CVE-2017-6673", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-06-13T06:29:01.127", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-05 20:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_services_software_for_asa:*:*:*:*:*:*:*:*", matchCriteriaId: "0A70505F-E716-439B-BE8C-B4CC3DF080E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "E102D5C4-D296-4F09-B4FA-62CD8E2E5CB1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "0BD5CFAE-5696-419C-B24E-7CF9E7EC7B92", versionEndIncluding: "2.9.12.15", versionStartIncluding: "2.9.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4DC81-DD37-46A6-8751-D0B4671E23BA", versionEndIncluding: "2.9.13.6", versionStartIncluding: "2.9.13", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "C37F0EAC-42D5-4D10-A5C8-6D975B7BF176", versionEndIncluding: "2.9.14.5", versionStartIncluding: "2.9.14.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad de normalización del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido a la insuficiente normalización de una carga útil basada en texto. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico que contenga cargas útiles especialmente ofuscadas por medio de un dispositivo afectado. Una explotación podría permitir al atacante evitar el filtrado y entregar cargas maliciosas hacia los sistemas protegidos que de otra manera se bloquearían.", }, ], id: "CVE-2019-1981", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-05T20:15:11.783", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.", }, { lang: "es", value: "Una vulnerabilidad en una API de registro en el software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado haga que el dispositivo deje de responder o desencadene una recarga inesperada. Esta vulnerabilidad también podría permitir que un atacante con credenciales de usuario válidas, pero sin privilegios de administrador, vea un archivo de registro del sistema al que normalmente no tendría acceso. Esta vulnerabilidad se debe a la falta de limitación de la velocidad de las solicitudes que se envían a una API específica relacionada con un registro FMC. Un atacante podría aprovechar esta vulnerabilidad enviando una alta tasa de solicitudes HTTP a la API. Un exploit exitoso podría permitir al atacante causar una condición de Denegación de Servicio (DoS) debido a que la CPU del FMC alcanza el 100 por ciento de utilización o a que el dispositivo se recarga. La utilización de la CPU volvería a la normalidad si el tráfico de ataque se detuviera antes de que se desencadenara una recarga inesperada.", }, ], id: "CVE-2023-20155", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:11.217", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-01 19:49
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker must have a valid account on the device that is configured with a custom read-only role.
This vulnerability is due to insufficient validation of role permissions in part of the web-based management interface. An attacker could exploit this vulnerability by performing a write operation on the affected part of the web-based management interface. A successful exploit could allow the attacker to modify certain parts of the configuration.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 7.2.0 | |
cisco | secure_firewall_management_center | 7.2.0.1 | |
cisco | secure_firewall_management_center | 7.2.1 | |
cisco | secure_firewall_management_center | 7.2.2 | |
cisco | secure_firewall_management_center | 7.2.3 | |
cisco | secure_firewall_management_center | 7.2.3.1 | |
cisco | secure_firewall_management_center | 7.2.4 | |
cisco | secure_firewall_management_center | 7.2.4.1 | |
cisco | secure_firewall_management_center | 7.2.5 | |
cisco | secure_firewall_management_center | 7.2.5.1 | |
cisco | secure_firewall_management_center | 7.2.5.2 | |
cisco | secure_firewall_management_center | 7.2.6 | |
cisco | secure_firewall_management_center | 7.2.7 | |
cisco | secure_firewall_management_center | 7.2.8 | |
cisco | secure_firewall_management_center | 7.2.8.1 | |
cisco | secure_firewall_management_center | 7.3.0 | |
cisco | secure_firewall_management_center | 7.3.1 | |
cisco | secure_firewall_management_center | 7.3.1.1 | |
cisco | secure_firewall_management_center | 7.3.1.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "4D803EC9-26EE-4799-A435-C782C92739CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "6EEF87CD-2335-4886-A65C-4E33775AEC52", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "953EB81A-1B53-4A57-9F59-D4A7D37E657E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "1CB534BC-3E4D-4484-AFD0-69524B1F07F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker must have a valid account on the device that is configured with a custom read-only role.\r\n\r This vulnerability is due to insufficient validation of role permissions in part of the web-based management interface. An attacker could exploit this vulnerability by performing a write operation on the affected part of the web-based management interface. A successful exploit could allow the attacker to modify certain parts of the configuration.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC), anteriormente Firepower Management Center Software, podría permitir que un atacante remoto autenticado eleve los privilegios en un dispositivo afectado. Para aprovechar esta vulnerabilidad, un atacante debe tener una cuenta válida en el dispositivo que esté configurada con un rol de solo lectura personalizado. Esta vulnerabilidad se debe a una validación insuficiente de los permisos de rol en parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad al realizar una operación de escritura en la parte afectada de la interfaz de administración basada en web. Una explotación exitosa podría permitir al atacante modificar ciertas partes de la configuración.", }, ], id: "CVE-2024-20482", lastModified: "2024-11-01T19:49:21.493", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:12.063", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-07-04 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/99209 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99209 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 5.4.0.2 | |
cisco | secure_firewall_management_center | 5.4.1 | |
cisco | secure_firewall_management_center | 5.4.1.1 | |
cisco | secure_firewall_management_center | 5.4.1.2 | |
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 5.4.1.4 | |
cisco | secure_firewall_management_center | 5.4.1.5 | |
cisco | secure_firewall_management_center | 5.4.1.6 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.", }, { lang: "es", value: "Una vulnerabilidad en el framework web de Firepower Management Center de Cisco, podría permitir a un atacante remoto identificado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz web. Productos afectados: Firepower Management Center de Cisco versiones 5.4.1.x y anteriores. Más información: CSCuy88951. Versiones Afectadas Conocidas: 5.4.1.6.", }, ], id: "CVE-2017-6715", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-07-04T00:29:00.523", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99209", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99209", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-16 17:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104725 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1041284 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104725 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041284 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar omita una política de control de acceso basada en URL que está configurada para bloquear el tráfico para un sistema afectado. La vulnerabilidad existe debido a que el software afectado gestiona incorrectamente los paquetes TCP que se reciben fuera de orden cuando se lanza una retransmisión TCP SYN. Un atacante podría explotar esta vulnerabilidad enviando una conexión maliciosamente manipulada a través de un dispositivo afectado. Un exploit exitoso podría permitir que el atacante omita una política de control de acceso basada en URL que está configurada para bloquear el tráfico para un sistema afectado. Cisco Bug IDs: CSCvh84511.", }, ], id: "CVE-2018-0384", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-16T17:29:00.643", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104725", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041284", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104725", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041284", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "1A4A1F0C-9CDB-4D33-98B9-6FFD5D729C5B", versionEndExcluding: "6.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz web del Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado redireccionar a un usuario hacia una página web maliciosa. La vulnerabilidad es debido a una comprobación de entrada inapropiada de los parámetros de petición HTTP. Un atacante podría explotar esta vulnerabilidad al interceptar y modificar una petición HTTP de un usuario. Una explotación con éxito podría permitir a un atacante redireccionar al usuario hacia una página web maliciosa específica.", }, ], id: "CVE-2020-3311", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.603", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-601", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-601", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en el dashboard RSS en la interfaz de administración basada en web de Firepower Management Center (FMC) de Cisco, podrían permitir a un atacante remoto no identificado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz de administración basada en web de un dispositivo afectado. Las vulnerabilidades son debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz de administración basada en web del dispositivo afectado. Un atacante podría explotar estas vulnerabilidades mediante la persuasión a un usuario de la interfaz para que haga clic en un enlace especialmente diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial y basada en el navegador.", }, ], id: "CVE-2019-1931", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-07-06T02:15:11.950", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-08-18 20:15
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Summary
A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:ironport_web_security_appliance:14.5:*:*:*:*:*:*:*", matchCriteriaId: "4016409A-673A-43E8-AE5F-DE6088CC35B3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*", matchCriteriaId: "80AD91C6-B7E3-48AC-8A51-3C05FE2659AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "86D052F5-7C8C-4012-A820-0182DA058585", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "EAECA338-DB26-4422-ACF9-2C459940900E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8BDF6775-C4E7-4F60-9492-374DE04E6681", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "303C8C86-E705-476F-B21B-AF6876EE0A56", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.", }, { lang: "es", value: "Una vulnerabilidad en el filtrado de peticiones Server Name Identification (SNI) de Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD) y Snort detection engine podría permitir a un atacante no autenticado remoto omitir la tecnología de filtrado en un dispositivo afectado y exfiltrar datos de un host comprometido. Esta vulnerabilidad es debido a un filtrado inadecuado del handshake SSL. Un atacante podría explotar esta vulnerabilidad al usar los datos del paquete de bienvenida del cliente SSL para comunicarse con un servidor externo. Una explotación con éxito podría permitir al atacante ejecutar un ataque de comando y control en un host comprometido y llevar a cabo ataques adicionales de exfiltración de datos.", }, ], id: "CVE-2021-34749", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-08-18T20:15:07.930", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 18:15
Modified
2024-11-26 16:09
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "8C8ECB61-27AB-49B9-8201-AD36C3E924B0", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de servicios web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado ejecute ciertos comandos de configuración no autorizados en un dispositivo Firepower Threat Defense (FTD) administrado por el software FMC. Esta vulnerabilidad se debe a una autorización insuficiente de los comandos de configuración que se envían a través de la interfaz del servicio web. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la interfaz de servicios web de FMC y enviando una solicitud HTTP manipulada a un dispositivo afectado. Un exploit exitoso podría permitir al atacante ejecutar ciertos comandos de configuración en el dispositivo FTD objetivo. Para explotar con éxito esta vulnerabilidad, un atacante necesitaría credenciales válidas en el software FMC.", }, ], id: "CVE-2023-20048", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T18:15:08.907", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco FMC Software could allow an authenticated, remote attacker to store malicious content for use in XSS attacks. This vulnerability is due to improper input sanitization in the web-based management interface of Cisco FMC Software. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to conduct a stored XSS attack on an affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco FMC Software could allow an authenticated, remote attacker to store malicious content for use in XSS attacks. This vulnerability is due to improper input sanitization in the web-based management interface of Cisco FMC Software. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to conduct a stored XSS attack on an affected device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en la web de Cisco FMC Software podría permitir que un atacante remoto autenticado almacene contenido malicioso para usarlo en ataques XSS. Esta vulnerabilidad se debe a una desinfección de entrada incorrecta en la interfaz de administración basada en la web de Cisco FMC Software. Un atacante podría aprovechar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un enlace malicioso. Una explotación exitosa podría permitir al atacante realizar un ataque XSS almacenado en un dispositivo afectado.", }, ], id: "CVE-2024-20387", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:07.480", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-16 17:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input handling of the SSL traffic. An attacker could exploit this vulnerability by sending a crafted SSL traffic to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco Bug IDs: CSCvi36434.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104727 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104727 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input handling of the SSL traffic. An attacker could exploit this vulnerability by sending a crafted SSL traffic to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco Bug IDs: CSCvi36434.", }, { lang: "es", value: "Una vulnerabilidad en el análisis del motor de detección del protocolo Secure Sockets Layer (SSL) de Cisco Firepower System Software podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) debido a que el proceso Snort se reinicia inesperadamente. La vulnerabilidad se debe a la gestión indebida del tráfico SSL. Un atacante podría explotar esta vulnerabilidad enviando tráfico SSL manipulado al motor de detección del dispositivo objetivo. Su explotación podría permitir que el atacante provoque una condición DoS si el proceso Snort se reinicia y se omite la inspección de tráfico o se deja el tráfico. Cisco Bug IDs: CSCvi36434.", }, ], id: "CVE-2018-0385", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-16T17:29:00.690", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104727", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104727", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-10-05 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 4.10.3 | |
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", matchCriteriaId: "8AA27341-2B4C-4FBE-B9BC-7005CDBA3FB5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.", }, { lang: "es", value: "Vulnerabilidad de inyección SQL en Cisco Firepower Management Center 4.10.3 hasta la versión 5.4.0 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través de vectores no especificados, vulnerabilidad también conocida como Bug ID CSCur25485.", }, ], id: "CVE-2016-6419", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-10-05T10:59:19.393", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/93206", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/93206", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.2:*:*:*:*:*:*:*", matchCriteriaId: "C02BEA3A-9ED1-4888-B6CF-A38D846E6549", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20403", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:08.193", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada diseñada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20410", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:09.197", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 2.0.3 | |
cisco | secure_firewall_management_center | 2.1.0 | |
cisco | secure_firewall_management_center | 2.1.1 | |
cisco | secure_firewall_management_center | 2.2.0 | |
cisco | secure_firewall_management_center | 2.3.0 | |
cisco | secure_firewall_management_center | 5.0.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "7FF8F9FC-9A18-4AC5-A90A-F7103CE562B7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "9ECF16EC-BF5F-4547-A7C4-A91801DE32F6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "4DE78FEC-FB06-4119-80E1-56F3877A9626", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0F22637F-C6C3-4A71-BF8A-0F1054EBED27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "AEBB8B45-E008-4461-AABD-D8D260CAC3F0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.0.0:*:*:*:*:*:*:*", matchCriteriaId: "9FB9CA77-4857-416A-8624-7D88B1DCC84C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en el Cisco Firepower Management Center (FMC) Software y el Cisco Firepower User Agent Software, podrían permitir a un atacante acceder a una parte confidencial de un sistema afectado con una cuenta muy privilegiada. Para más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso.", }, ], id: "CVE-2020-3301", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.010", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-22 18:15
Modified
2025-04-11 14:53
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice ataques de inyección SQL en un sistema afectado. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida adecuadamente la entrada del usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación y enviando consultas SQL manipuladas a un sistema afectado. Un exploit exitoso podría permitir al atacante obtener datos de la base de datos, ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Para aprovechar esta vulnerabilidad, un atacante necesitaría al menos credenciales de usuario de sólo lectura.", }, ], id: "CVE-2024-20360", lastModified: "2025-04-11T14:53:31.370", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-22T18:15:09.493", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20839", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:25.727", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "EE66CA02-37AA-4530-9C0A-219E5296A814", versionEndExcluding: "6.2.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web del Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto autenticado sobrescribir archivos en el sistema de archivos de un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad al cargar un archivo diseñado en la Interfaz de Usuario web sobre un dispositivo afectado. Una explotación con éxito podría permitir a un atacante sobrescribir archivos en el sistema de archivos del dispositivo afectado.", }, ], id: "CVE-2020-3302", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 8.5, confidentialityImpact: "NONE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:N/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 9.2, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.073", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by crafting an XML-based widget on an affected server. A successful exploit could cause increased memory and CPU utilization, which could result in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by crafting an XML-based widget on an affected server. A successful exploit could cause increased memory and CPU utilization, which could result in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en el widget dashboard del software Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a restricciones inapropiadas en entidades XML. Un atacante podría explotar esta vulnerabilidad al crear un widget basado en XML en un servidor afectado. Una explotación con éxito podría causar una mayor utilización de la memoria y la CPU, lo que podría resultar en una condición DoS.", }, ], id: "CVE-2021-1267", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:21.380", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-776", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-776", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API.", }, { lang: "es", value: "Una vulnerabilidad en el demonio de la API de entrada del host de Cisco Firepower Management Center (FMC) Software podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobación inapropiada del certificado. Un atacante podría explotar esta vulnerabilidad mediante el envío de un flujo de datos diseñado al demonio de entrada del host del dispositivo afectado. Una explotación con éxito podría permitir a un atacante causar que el demonio de entrada del host se reinicie. El atacante podría usar ataques repetidos para causar que el demonio se recargue continuamente, creando una condición de DoS para la API", }, ], id: "CVE-2020-3557", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:17.607", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-295", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-06-18 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCur25516.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 4.10.3 | |
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", matchCriteriaId: "8AA27341-2B4C-4FBE-B9BC-7005CDBA3FB5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCur25516.", }, { lang: "es", value: "Vulnerabilidad de XSS en Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.1 y 5.4.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una URL manipulada, también conocida como Bug ID CSCur25516.", }, ], id: "CVE-2016-1431", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-06-18T01:59:01.107", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the RSS dashboard in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en el dashboard RSS en la interfaz de administración basada en web de Firepower Management Center (FMC) de Cisco, podrían permitir a un atacante remoto no identificado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz de administración basada en web de un dispositivo afectado. Las vulnerabilidades son debido a una comprobación insuficiente de la entrada suministrada por el usuario por la interfaz de administración basada en web del dispositivo afectado. Un atacante podría explotar estas vulnerabilidades mediante la persuasión a un usuario de la interfaz para que haga clic en un enlace especialmente diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial y basada en el navegador.", }, ], id: "CVE-2019-1930", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-07-06T02:15:11.870", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-03 15:29
Modified
2024-11-26 16:09
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.4 (High) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 2.9.8 | |
cisco | secure_firewall_management_center | 2.9.9 | |
cisco | secure_firewall_management_center | 2.9.10 | |
cisco | secure_firewall_management_center | 2.9.11 | |
cisco | secure_firewall_management_center | 2.9.12 | |
cisco | secure_firewall_management_center | 2.9.13 | |
cisco | firepower_threat_defense | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.8:*:*:*:*:*:*:*", matchCriteriaId: "9D53BAE0-F5FA-4FD9-9F13-21B3DDCA2ED3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.9:*:*:*:*:*:*:*", matchCriteriaId: "40CC4B82-5F54-49E3-921B-AB1A66D264A7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.10:*:*:*:*:*:*:*", matchCriteriaId: "6DB04A5E-4DEA-48F8-9819-3232C5CEB9DA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.11:*:*:*:*:*:*:*", matchCriteriaId: "7FEAF14A-431F-43A0-9E7E-1B8039D5B954", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.12:*:*:*:*:*:*:*", matchCriteriaId: "8532C989-889B-4DEE-8687-6C67F173E50D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.13:*:*:*:*:*:*:*", matchCriteriaId: "9A0E77B1-0B0C-47A6-B906-7BBA3CF8C890", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "73A0B57C-1076-4382-BADE-9EB2E18FAB9C", versionEndExcluding: "6.2.3.12", versionStartIncluding: "6.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en el motor de detección del preprocesador del Protocolo Server Message Block (SMB) para el software Firepower Threat Defense (FTD) Cisco, podrían permitir a un atacante no identificado, adyacente o remoto, causar una condición de Denegación de Servicio (DoS). Para más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso.", }, ], id: "CVE-2019-1696", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-03T15:29:01.167", references: [ { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/108171", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/108171", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-07 22:29
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/106927 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106927 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.2.3.6 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4:*:*:*:*:*:*:*", matchCriteriaId: "8268E005-1B45-4BF5-8697-4D7BB387585D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a la validación insuficiente de entrada de datos de parte del usuario en la interfaz de gestión web del sistema afectado. Un atacante podría explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace cuidadosamente manipulado. Su explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz afectada o que pueda acceder a información sensible del navegador.", }, ], id: "CVE-2019-1671", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-07T22:29:00.413", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106927", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106927", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F2743828-DD1E-4A07-85CA-462877F6B819", versionEndExcluding: "6.2.2.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web del Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz de administración basada en web del software FMC. La vulnerabilidad es debido a una comprobación insuficiente de una entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar esta vulnerabilidad al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir a un atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en navegador.", }, ], id: "CVE-2020-3313", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.743", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "493313EB-7599-454D-9C8B-7E32754F3AF5", versionEndExcluding: "6.6.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad sftunnel de Cisco Firepower Management Center (FMC) Software y Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto no autenticado obtener el hash de registro del dispositivo. La vulnerabilidad es debido a una protección de negociación de sftunnel insuficiente durante el registro inicial del dispositivo. Un atacante en una posición man-in-the-middle podría explotar esta vulnerabilidad al interceptar un flujo específico de la comunicación sftunnel entre un dispositivo FMC y un dispositivo FTD. Una explotación con éxito podría permitir a un atacante descifrar y modificar la comunicación sftunnel entre los dispositivos FMC y FTD, permitiendo a un atacante modificar los datos de configuración enviados desde un dispositivo FMC hacia un dispositivo FTD o los datos de alerta enviados desde un dispositivo FTD a un dispositivo FMC", }, ], id: "CVE-2020-3549", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:17.123", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-326", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-326", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross Site Scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del dashboard de FMC.", }, ], id: "CVE-2022-20936", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:34.160", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "8C8ECB61-27AB-49B9-8201-AD36C3E924B0", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "CE251BEB-449B-47EC-831F-C2A410A45A8E", versionEndIncluding: "7.2.4", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2023-20206", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:11.427", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada diseñada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20415", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:09.713", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E53730A8-CB03-4F3F-A6CD-2892A83C6F4C", versionEndExcluding: "6.4.0.15", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E61F52ED-2191-4D0C-9D9F-DE69B62218BA", versionEndExcluding: "6.6.5.2", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1D6092C-AFB7-49AD-9303-3BEC14315316", versionEndExcluding: "7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en la web del software Cisco Firepower Management Center (FMC) podrían permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a que la interfaz de administración basada en la web no comprueba suficientemente las entradas proporcionadas por el usuario. Un atacante podría explotar estas vulnerabilidades al convencer a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2022-20627", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:08.753", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-08-08 08:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Firepower Management Center de Cisco, podría permitir a un atacante remoto autenticado realizar un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz de administración basada en web de un sistema afectado. La vulnerabilidad es debido a una comprobación insuficiente de la información suministrada por el usuario mediante la interfaz de administración basada en web del sistema afectado. Un atacante podría explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace malicioso. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2019-1949", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-08-08T08:15:12.210", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "EE66CA02-37AA-4530-9C0A-219E5296A814", versionEndExcluding: "6.2.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado ejecutar código arbitrario sobre el sistema operativo subyacente de un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de comandos maliciosos hacia la interfaz de administración basada en web de un dispositivo afectado. Una explotación con éxito podría permitir al atacante ejecutar código arbitrario sobre el sistema operativo subyacente del dispositivo afectado.", }, ], id: "CVE-2019-12689", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.140", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-10-06 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.", }, { lang: "es", value: "Cisco Firepower Management Center 6.0.1 tiene las credenciales de la base de datos embebida, lo que permite a usuarios locales obtener información sensible aprovechando el acceso CLI, vulnerabilidad también conocida como Bug ID CSCva30370.", }, ], id: "CVE-2016-6434", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-10-06T10:59:15.383", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/93412", }, { source: "psirt@cisco.com", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "psirt@cisco.com", url: "https://www.exploit-db.com/exploits/40465/", }, { source: "psirt@cisco.com", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/93412", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/40465/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-05-02 22:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104122 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104122 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.", }, { lang: "es", value: "Una vulnerabilidad en Cisco Firepower System Software podría permitir que un atacante remoto no autenticado acceda a datos sensibles del sistema. La vulnerabilidad se debe a protecciones indebidas de Cross-Origin Domain para el protocolo WebSocket. Un atacante podría explotar esta vulnerabilidad convenciendo a un usuario para que visite un sitio web malicioso diseñado para enviar peticiones a la aplicación afectada mientras el usuario tenga la sesión iniciada en la aplicación con una cookie de sesión activa. Su explotación con éxito podría permitir que el atacante recupere información de políticas o configuración del software afectado y realice otro ataque contra la consola de gestión. Cisco Bug IDs: CSCvh68311.", }, ], id: "CVE-2018-0278", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-05-02T22:29:00.967", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104122", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104122", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-05 20:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_services_software_for_asa | - | |
cisco | firepower_threat_defense | - | |
cisco | secure_firewall_management_center | 2.9.13 | |
cisco | secure_firewall_management_center | 2.9.14.0 | |
cisco | secure_firewall_management_center | 3.0.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_services_software_for_asa:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C5EF69-498C-4433-8B86-91EB343C3F63", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:-:*:*:*:*:*:*:*", matchCriteriaId: "1E239E86-8CC7-4BE1-BE5F-AF623DB68058", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.13:*:*:*:*:*:*:*", matchCriteriaId: "9A0E77B1-0B0C-47A6-B906-7BBA3CF8C890", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:3.0.0:*:*:*:*:*:*:*", matchCriteriaId: "B0E7A9BD-8C83-401C-BB3E-E52F4B7608A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.", }, { lang: "es", value: "Una vulnerabilidad en el componente de filtrado de tráfico HTTP del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido al manejo inapropiado de las peticiones HTTP, incluidas las comunicadas por medio de una conexión HTTPS segura, que contienen encabezados especialmente diseñados con fines maliciosos. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones maliciosas a un dispositivo afectado. Una explotación podría permitir al atacante evitar el filtrado y entregar peticiones maliciosas hacia los sistemas protegidos, lo que permitiría a atacantes entregar contenido malicioso que de otra manera se bloquearía.", }, ], id: "CVE-2019-1982", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-05T20:15:11.907", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-276", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-07-04 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc38801. Known Affected Releases: 6.0.1.3 6.2.1. Known Fixed Releases: 6.2.1.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/99217 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99217 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.9:*:*:*:*:*:*:*", matchCriteriaId: "3614E72A-667E-47F4-8D42-C1EB210E4DB5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4_base:*:*:*:*:*:*:*", matchCriteriaId: "9B2E1AA9-8A80-489A-8A6F-E9034E7D2A82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AF40DB44-C213-466E-B473-B07B30A42B34", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6D4EB1FD-690B-4F8C-A559-BC76CA5FDEFF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.3:*:*:*:*:*:*:*", matchCriteriaId: "9D184D6D-D695-48D5-90E6-95185C1D397D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0_base:*:*:*:*:*:*:*", matchCriteriaId: "554F229F-A0F5-4CA9-9778-5585E01ADF6E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc38801. Known Affected Releases: 6.0.1.3 6.2.1. Known Fixed Releases: 6.2.1.", }, { lang: "es", value: "Una vulnerabilidad en el framework web de Firepower Management Center de Cisco, podría permitir a un atacante remoto identificado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz web. Más información: CSCvc38801. Versiones Afectadas Conocidas: 6.0.1.3 6.2.1. Versiones Fijas Conocidas: 6.2.1.", }, ], id: "CVE-2017-6717", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-07-04T00:29:00.587", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99217", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-07-04 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web framework code of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. Affected Products: Cisco Firepower Management Center Software Releases prior to 6.0.0.0. More Information: CSCuy88785. Known Affected Releases: 5.4.1.6.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/99220 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99220 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.3.1.7 | |
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 5.4.0.2 | |
cisco | secure_firewall_management_center | 5.4.1 | |
cisco | secure_firewall_management_center | 5.4.1.1 | |
cisco | secure_firewall_management_center | 5.4.1.2 | |
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 5.4.1.4 | |
cisco | secure_firewall_management_center | 5.4.1.5 | |
cisco | secure_firewall_management_center | 5.4.1.6 | |
cisco | secure_firewall_management_center | 5.4.1.9 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.7:*:*:*:*:*:*:*", matchCriteriaId: "861C3411-ECAE-4772-A2E4-A75526B658D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.9:*:*:*:*:*:*:*", matchCriteriaId: "3614E72A-667E-47F4-8D42-C1EB210E4DB5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework code of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. Affected Products: Cisco Firepower Management Center Software Releases prior to 6.0.0.0. More Information: CSCuy88785. Known Affected Releases: 5.4.1.6.", }, { lang: "es", value: "Una vulnerabilidad en el código del framework web de Firepower Management Center de Cisco, podría permitir a un atacante remoto identificado conducir un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz web de un sistema afectado. Productos afectados: Programa Cisco Firepower Management Center versiones anteriores a 6.0.0.0. Más información: CSCuy88785. Versiones Afectadas Conocidas: 5.4.1.6.", }, ], id: "CVE-2017-6716", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-07-04T00:29:00.557", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99220", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99220", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web del Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado ejecutar comandos arbitrarios sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de entradas diseñadas hacia la Interfaz de Usuario web. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios dentro del dispositivo afectado.", }, ], id: "CVE-2019-12687", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.017", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "AD83F585-B278-44C6-92AE-5B1CF434B17D", versionEndIncluding: "6.0.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "9D27DE97-510A-4761-8184-6940745B54E2", versionEndExcluding: "6.3.0.6", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "53C69C8B-5A19-4613-8861-683CF21806B7", versionEndExcluding: "6.4.0.10", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "1DC52A8B-7DF4-47B2-9F49-627F59656E5E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "AD48BE40-C647-429A-81B6-59E125BBE415", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "AFD334C0-7B9C-4550-A005-86EF209B5C9A", versionEndIncluding: "6.0.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "7960516D-9A46-41EE-A0FE-E139A64DD62C", versionEndExcluding: "6.3.0.6", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4BCE8F18-CC15-40E5-8419-5BC6E761E37E", versionEndExcluding: "6.4.0.10", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device.", }, { lang: "es", value: "Una vulnerabilidad en el demonio sfmgr de Cisco Firepower Management Center (FMC) Software y Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto autenticado llevar a cabo un salto de directorio y acceder a directorios fuera de la ruta restringida. La vulnerabilidad es debido a una comprobación insuficiente de la entrada. Un atacante podría explotar esta vulnerabilidad mediante el uso de una ruta relativa en comandos sfmgr específicos. Una explotación podría permitir a un atacante leer o escribir archivos arbitrarios en un dispositivo peer conectado a sftunnel", }, ], id: "CVE-2020-3550", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 5.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:17.217", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-10-27 19:15
Modified
2024-11-26 16:09
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | 3.1.0.1 | |
snort | snort | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "17F461B5-E600-4C81-BA3C-1DBC90D4D438", versionEndExcluding: "6.4.0.13", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "EDF402F7-DFC5-4A83-A209-9905AE54C49F", versionEndExcluding: "6.6.5.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "98DEDDAB-B8C5-4753-A208-94638E694FC1", versionEndExcluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "7B2F537A-A488-45B6-AD4B-48B7064AE84C", versionEndExcluding: "7.0.1", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:3.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6E394E28-4638-426A-B2A1-5EB15C36D711", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", matchCriteriaId: "06B9024D-9EA8-4EB8-9D7C-413B9CE2F89D", versionEndExcluding: "3.1.0.100", versionStartIncluding: "3.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad en las reglas de Snort que podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido al manejo inapropiado de las acciones de Bloqueo con Reinicio o Bloqueo Interactivo con Reinicio si una regla está configurada sin las restricciones apropiadas. Un atacante podría aprovechar esta vulnerabilidad mediante el envío de un paquete IP diseñado al dispositivo afectado. Una explotación con éxito podría permitir al atacante causar una caída del tráfico de paso. Nota: Sólo son vulnerables los productos con Snort3 configurado y con una regla con acciones de bloqueo con reinicio o de bloqueo interactivo con reinicio. Los productos configurados con Snort2 no son vulnerables", }, ], id: "CVE-2021-40116", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-27T19:15:08.717", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-241", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz de administración basada en web. La vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar esta vulnerabilidad insertando código malicioso en ciertas secciones de la interfaz que son visibles para otros usuarios. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en navegador. Un atacante necesitaría credenciales de administrador válidas para explotar esta vulnerabilidad.", }, ], id: "CVE-2019-15280", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-16T19:15:15.253", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-02-22 02:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.", }, { lang: "es", value: "Una vulnerabilidad en el marco web de Cisco Firepower Management Center podría permitir a un atacante remoto autenticado llevar a cabo un ataque de XSS contra un usuario de la interfaz web. Más Información: CSCvc72741. Lanzamientos Afectados Conocidos: 6.2.1.Cisco Firepower Management Center", }, ], id: "CVE-2017-3847", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-02-22T02:59:00.717", references: [ { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/96253", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96253", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross Site Scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del dashboard de FMC.", }, ], id: "CVE-2022-20935", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:33.947", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E53730A8-CB03-4F3F-A6CD-2892A83C6F4C", versionEndExcluding: "6.4.0.15", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E61F52ED-2191-4D0C-9D9F-DE69B62218BA", versionEndExcluding: "6.6.5.2", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1D6092C-AFB7-49AD-9303-3BEC14315316", versionEndExcluding: "7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "AA58257F-F024-42AB-B043-E4DFE9A169AD", versionEndExcluding: "7.1.0.1", versionStartIncluding: "7.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración web del software Cisco Firepower Management Center (FMC) podría permitir a un atacante remoto autenticado omitir las protecciones de seguridad y cargar archivos maliciosos en el sistema afectado. Esta vulnerabilidad es debido a que no se han comprobado apropiadamente los archivos cargados en la interfaz de administración web del software Cisco FMC. Un atacante podría explotar esta vulnerabilidad al cargar un archivo maliciosamente diseñado a un dispositivo que ejecute el software afectado. Una explotación con éxito podría permitir al atacante almacenar archivos maliciosos en el dispositivo, a los que podría acceder más tarde para conducir ataques adicionales, incluyendo la ejecución de código arbitrario en el dispositivo afectado con privilegios de root", }, ], id: "CVE-2022-20743", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:09.377", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-434", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-434", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "681AD618-9A3F-422B-96F0-BB6E38D9DE08", versionEndExcluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un sistema afectado. Las vulnerabilidades se presentan porque la interfaz de administración basada en web no comprueba apropiadamente la entrada suministrada por el usuario. Un atacante podría explotar estas vulnerabilidades persuadiendo a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2021-1239", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:20.817", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.2:*:*:*:*:*:*:*", matchCriteriaId: "C02BEA3A-9ED1-4888-B6CF-A38D846E6549", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20409", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:08.970", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12685", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.890", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E53730A8-CB03-4F3F-A6CD-2892A83C6F4C", versionEndExcluding: "6.4.0.15", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E61F52ED-2191-4D0C-9D9F-DE69B62218BA", versionEndExcluding: "6.6.5.2", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1D6092C-AFB7-49AD-9303-3BEC14315316", versionEndExcluding: "7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en la web del software Cisco Firepower Management Center (FMC) podrían permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a que la interfaz de administración basada en la web no comprueba suficientemente las entradas proporcionadas por el usuario. Un atacante podría explotar estas vulnerabilidades al convencer a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2022-20628", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:08.860", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.6.0 | |
cisco | secure_firewall_management_center | 6.6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad de autenticación Common Access Card (CAC) de Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado omitir la autenticación y acceder al sistema FMC. El atacante debe tener un CAC válido para iniciar el intento de acceso. La vulnerabilidad es debido a una incorrecta invalidación de la sesión durante la autenticación CAC. Un atacante podría explotar esta vulnerabilidad al llevar a cabo un intento de autenticación basado en CAC en un sistema afectado. Una explotación con éxito podría permitir a un atacante acceder a un sistema afectado con los privilegios de un usuario autenticado por CAC que actualmente está conectado", }, ], id: "CVE-2020-3410", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:15.997", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-05 20:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_services_software_for_asa:*:*:*:*:*:*:*:*", matchCriteriaId: "0A70505F-E716-439B-BE8C-B4CC3DF080E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "E102D5C4-D296-4F09-B4FA-62CD8E2E5CB1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "0BD5CFAE-5696-419C-B24E-7CF9E7EC7B92", versionEndIncluding: "2.9.12.15", versionStartIncluding: "2.9.12", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4DC81-DD37-46A6-8751-D0B4671E23BA", versionEndIncluding: "2.9.13.6", versionStartIncluding: "2.9.13", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "C37F0EAC-42D5-4D10-A5C8-6D975B7BF176", versionEndIncluding: "2.9.14.5", versionStartIncluding: "2.9.14.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.", }, { lang: "es", value: "Una vulnerabilidad en el componente de reensamblado continuo del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido al reensamblaje inapropiado de los flujos de tráfico. Un atacante podría explotar esta vulnerabilidad mediante el envío de secuencias creadas por medio de un dispositivo afectado. Una explotación podría permitir al atacante omitir el filtrado y entregar peticiones maliciosas hacia los sistemas protegidos que de otra manera se bloquearían.", }, ], id: "CVE-2019-1978", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-05T20:15:11.500", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12681", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.577", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-08-18 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 4.10.3 | |
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", matchCriteriaId: "8AA27341-2B4C-4FBE-B9BC-7005CDBA3FB5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.", }, { lang: "es", value: "La GUI basada en web en Cisco Firepower Management Center 4.x y 5.x en versiones anteriores a 5.3.0.3, 5.3.1.x en versiones anteriores a 5.3.1.2 y 5.4.x en versiones anteriores a 5.4.0.1 y Cisco Adaptive Security Appliance (ASA) Software en dispositivos 5500-X con FirePOWER Services 4.x y 5.x en versiones anteriores a 5.3.0.3, 5.3.1.x en versiones anteriores a 5.3.1.2 y 5.4.x en versiones anteriores a 5.4.0.1 permite a usuarios remotos autenticados aumentar los privilegios de cuenta de usuario a través de peticiones HTTP manipuladas, también conocido como Bug ID CSCur25483.", }, ], id: "CVE-2016-1458", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-08-18T19:59:02.537", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/92512", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/92512", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-10-06 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.2.0 | |
cisco | secure_firewall_management_center | 5.3.0 | |
cisco | secure_firewall_management_center | 5.3.0.2 | |
cisco | secure_firewall_management_center | 5.3.0.3 | |
cisco | secure_firewall_management_center | 5.3.0.4 | |
cisco | secure_firewall_management_center | 5.3.1 | |
cisco | secure_firewall_management_center | 5.3.1.3 | |
cisco | secure_firewall_management_center | 5.3.1.4 | |
cisco | secure_firewall_management_center | 5.3.1.5 | |
cisco | secure_firewall_management_center | 5.3.1.6 | |
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 5.4.0.2 | |
cisco | secure_firewall_management_center | 5.4.1 | |
cisco | secure_firewall_management_center | 5.4.1.1 | |
cisco | secure_firewall_management_center | 5.4.1.2 | |
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 5.4.1.4 | |
cisco | secure_firewall_management_center | 5.4.1.5 | |
cisco | secure_firewall_management_center | 5.4.1.6 | |
cisco | secure_firewall_management_center | 6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30E233C0-7547-479D-BC2B-A9F75106ADF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "6208D84A-C7EE-4F9D-82B2-C3BD657A6B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "E12A7E1A-DD5F-4D24-B40C-9B6A4B06B7E6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "E80F6ABE-ED3A-4F37-91E7-102DB4B63BC4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", matchCriteriaId: "9FC04411-7DDF-4E11-A22C-1013396AC47B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.3:*:*:*:*:*:*:*", matchCriteriaId: "B03AFE63-7D90-4092-9AB0-E05531EB0412", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.4:*:*:*:*:*:*:*", matchCriteriaId: "C06AC416-34EE-4881-8CCE-7E5CDD185364", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.5:*:*:*:*:*:*:*", matchCriteriaId: "47D22E4A-D02B-48E7-86D9-2A05A07C8A54", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.6:*:*:*:*:*:*:*", matchCriteriaId: "8695C71C-53B3-49F6-9BDD-85A45762D9D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.", }, { lang: "es", value: "El Threat Management Console en Cisco Firepower Management Center 5.2.0 hasta la versión 6.0.1 permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de parámetros de aplicación web manipulados, vulnerabilidad también conocida como Bug ID CSCva30872.", }, ], id: "CVE-2016-6433", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-10-06T10:59:14.337", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93414", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/40463/", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/41041/", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93414", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/40463/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/41041/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-10-05 07:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort process restarts unexpectedly. The vulnerability is due to improper input validation of the fields in the IPv6 extension header packet. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability is specific to IPv6 traffic only. This vulnerability affects Cisco Firepower System Software Releases 6.0 and later when the software has one or more file action policies configured and is running on any of the following Cisco products: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Cisco Bug IDs: CSCvd34776.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101119 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101119 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.1 | |
cisco | secure_firewall_management_center | 6.0.1 | |
cisco | secure_firewall_management_center | 6.0.1.3 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.1.0.3 | |
cisco | secure_firewall_management_center | 6.1.0.6 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.0.2 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AF40DB44-C213-466E-B473-B07B30A42B34", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.3:*:*:*:*:*:*:*", matchCriteriaId: "9D184D6D-D695-48D5-90E6-95185C1D397D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort process restarts unexpectedly. The vulnerability is due to improper input validation of the fields in the IPv6 extension header packet. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability is specific to IPv6 traffic only. This vulnerability affects Cisco Firepower System Software Releases 6.0 and later when the software has one or more file action policies configured and is running on any of the following Cisco products: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Cisco Bug IDs: CSCvd34776.", }, { lang: "es", value: "Una vulnerabilidad en el análisis del motor de detección de paquetes IPv6 para Cisco Firepower System Software podría permitir que un atacante remoto no autenticado provoque un uso intensivo de la CPU o una denegación de servicio (DoS) debido a que el proceso Snort se reinicia de forma inesperada. Esta vulnerabilidad se debe a una validación incorrecta de las entradas de los campos en el paquete de cabeceras con extensión IPv6. Un atacante podría explotar esta vulnerabilidad enviando un paquete IPv6 malicioso al motor de detección del dispositivo objetivo. Un exploit podría permitir que el atacante provoque una condición DoS si el proceso Snort se reinicia y se omite o se anula la inspección de tráfico. Esta vulnerabilidad es específica solo para el tráfico IPv6. Esta vulnerabilidad afecta a las versiones 6.0 y siguientes de Cisco Firepower System Software cuando el software tiene configuradas una o más políticas de acción de archivo y se ejecuta sobre uno de los siguientes productos Cisco: 3000 Series Industrial Security Appliances (ISR), Adaptive Security Appliance (ASA) 5500-X Series con servicios FirePOWER, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) para redes, 7000 Series Appliances, Advanced Malware Protection (AMP) para redes, 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower Threat Defense para routers de servicios integrados (ISR), Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) para VMware. Cisco Bug IDs: CSCvd34776.", }, ], id: "CVE-2017-12244", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-10-05T07:29:00.213", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101119", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101119", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "94146309-66F7-4349-83CF-7969E13F3A7A", versionEndExcluding: "9.6.4.36", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "7734DDF0-8B78-4204-9C44-98A80F01CF87", versionEndExcluding: "9.8.4.15", versionStartIncluding: "9.7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "83755BBD-15E6-44F9-976A-926B6639EBE4", versionEndExcluding: "9.9.2.61", versionStartIncluding: "9.9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "9B6D76A5-C479-4588-A571-B2E8268A3139", versionEndExcluding: "9.10.1.32", versionStartIncluding: "9.10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "E1419728-88C1-49C2-B269-5D2353E109D1", versionEndExcluding: "9.12.3", versionStartIncluding: "9.12", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "2EECA0E3-5C6E-41C1-AEA5-CE82ABEAC4FE", versionEndExcluding: "9.13.1.4", versionStartIncluding: "9.13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "1D4AA06A-42DA-43F8-94D5-3035AFF4FEF1", versionEndExcluding: "9.14.2.7", versionStartIncluding: "9.14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", matchCriteriaId: "DE9FD6FC-FA97-41EB-B75B-E2D0A6481D96", versionEndExcluding: "9.15.1.4", versionStartIncluding: "9.15", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3EABB3BD-4AF7-4FC1-9090-19B07F1B578D", versionEndExcluding: "6.2.3.16", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "7960516D-9A46-41EE-A0FE-E139A64DD62C", versionEndExcluding: "6.3.0.6", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "970816D7-3FC8-430A-BEFB-D8F3E5F84301", versionEndExcluding: "6.4.0.7", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FBC14B4B-D535-49DF-ABA2-BB4057A4BC47", versionEndExcluding: "6.5.0.2", versionStartIncluding: "6.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:-:*:*:*:*:*:*:*", matchCriteriaId: "1E239E86-8CC7-4BE1-BE5F-AF623DB68058", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.", }, { lang: "es", value: "Una vulnerabilidad en la implementación del intérprete Lua integrado en Cisco Adaptive Security Appliance (ASA) Software y Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto autenticado ejecutar código arbitrario con privilegios root en el sistema operativo Linux subyacente de un dispositivo afectado. La vulnerabilidad es debido a restricciones insuficientes en las llamadas a funciones Lua permitidas dentro del contexto de los scripts Lua suministrados por el usuario. Una explotación con éxito podría permitir al atacante desencadenar una condición de desbordamiento de la pila y ejecutar código arbitrario con privilegios root en el sistema operativo Linux subyacente de un dispositivo afectado", }, ], id: "CVE-2019-15992", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-23T01:15:13.333", references: [ { source: "psirt@cisco.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E53730A8-CB03-4F3F-A6CD-2892A83C6F4C", versionEndExcluding: "6.4.0.15", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "E61F52ED-2191-4D0C-9D9F-DE69B62218BA", versionEndExcluding: "6.6.5.2", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1D6092C-AFB7-49AD-9303-3BEC14315316", versionEndExcluding: "7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Varias vulnerabilidades en la interfaz de administración basada en la web del software Cisco Firepower Management Center (FMC) podrían permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a que la interfaz de administración basada en la web no comprueba suficientemente las entradas proporcionadas por el usuario. Un atacante podría explotar estas vulnerabilidades al convencer a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2022-20629", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:08.933", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-08 05:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | sourcefire_defense_center | 6.4.0 | |
cisco | sourcefire_defense_center | 6.4.0.6 | |
cisco | sourcefire_defense_center | 6.5.0 | |
cisco | sourcefire_defense_center | 6.6.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "87BBB477-A383-4FC9-9465-AD211F0D6FEA", versionEndIncluding: "6.6.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "2EBC6544-6ADF-4F95-A969-A8D953D11B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "B7D907DF-069F-4DF6-8199-699DEB906C0D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sourcefire_defense_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "04DF03B7-9C70-4BEE-8AE4-6AA134322C0A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sourcefire_defense_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "A4F47E43-116B-4176-9E79-0BA7CBA16869", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Firepower Management Center, podría permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz de administración basada en web de un dispositivo afectado. La vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz de administración basada en web de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad al ingresar una entrada primero dentro de la interfaz de administración basada en web y luego al persuadir al usuario de la interfaz para que visualice la entrada diseñada dentro de la interfaz. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en navegador", }, ], id: "CVE-2020-3320", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-08T05:15:14.367", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to write arbitrary entries to the log file on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send incorrect information to the system log on the affected system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to write arbitrary entries to the log file on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send incorrect information to the system log on the affected system.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web del Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado escribir entradas arbitrarias en el archivo de registro sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante enviar información incorrecta hacia el registro del sistema en el sistema afectado.", }, ], id: "CVE-2020-3307", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.323", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.
This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "24CD0B0A-2B91-45DD-9522-8D1D3850CC9B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "F2A5530C-DF29-421B-9712-3454C1769446", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "B05791F9-0B31-4C4C-A9BA-9268CAA45FB2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "B6D7AF29-4E08-4BFD-AFE0-994309E66F08", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "E6E3A5DC-A237-46E4-A4E5-F135482F984A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CE51492-8C9B-459E-9F80-64F426009905", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "55FE024D-0D43-40AD-9645-8C54ECF17824", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "596EC5DD-D7F4-44C8-B4B5-E2DC142FC486", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "469EA365-DED5-4436-AAC2-5553529DE700", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "795ED164-7800-4D50-8E37-665BE30190D9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "724A3B6F-DDAB-4A2F-8430-9E1F352D755F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.\r\n\r This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset.", }, { lang: "es", value: "Una vulnerabilidad en la función de cambio de contraseña del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado determine nombres de usuario válidos en un dispositivo afectado. Esta vulnerabilidad se debe a una autenticación incorrecta de las respuestas de actualización de contraseña. Un atacante podría aprovechar esta vulnerabilidad al forzar el restablecimiento de contraseña en un dispositivo afectado. Una explotación exitosa podría permitir al atacante determinar nombres de usuario válidos en la respuesta no autenticada a un restablecimiento forzado de contraseña.", }, ], id: "CVE-2024-20388", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:07.697", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-202", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-05-02 22:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104121 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104121 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar reinicie una instancia del motor de detección Snort en un dispositivo afectado y provoque una breve denegación de servicio (DoS) como consecuencia. Esta vulnerabilidad se debe a una gestión incorrecta de una configuración de conexión TCP Transport Layer Security (TLS) para el software afectado. Un atacante podría explotar esta vulnerabilidad enviando tráfico TLS manipulado al dispositivo afectado. Un exploit con éxito podría permitir que el atacante provoque el reinicio inesperado del motor de detección de Snort en el sistema afectado, lo que daría como resultado una condición de DoS temporal. Cisco Bug IDs: CSCvg99327.", }, ], id: "CVE-2018-0283", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-05-02T22:29:01.120", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104121", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104121", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-310", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-319", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-06-07 21:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104422 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104422 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.", }, { lang: "es", value: "Una vulnerabilidad en la gestión de configuración de VPN del software Cisco FireSIGHT System podría permitir que un atacante remoto no autenticado omita la seguridad VPN debido a efectos secundarios no planeados de los cambios de configuración dinámica que podrían permitir que un atacante omita las políticas configuradas. La vulnerabilidad se debe a la gestión incorrecta de los nombres de interfaz configurados y a los parámetros VPN cuando se realizan cambios de configuración dinámicos en la interfaz de línea de comandos. Un atacante podría explotar esta vulnerabilidad enviando paquetes a través de una interfaz al dispositivo objetivo. Su explotación con éxito podría permitir que el atacante omita las políticas VPN configuradas. Cisco Bug IDs: CSCvh49388.", }, ], id: "CVE-2018-0333", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-07T21:29:00.463", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104422", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104422", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.", }, { lang: "es", value: "Una vulnerabilidad en la función de descarga de archivos del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado descargue archivos arbitrarios de un sistema afectado. Esta vulnerabilidad se debe a la falta de sanitización de entrada. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTPS manipulada. Un exploit exitoso podría permitir al atacante descargar archivos arbitrarios del sistema afectado.", }, ], id: "CVE-2023-20114", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:11.147", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-73", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-01 18:16
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "6E255975-F952-43AB-A577-B8D331DDB3AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "249F9108-758A-4118-94C1-BAC747AF45ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "3C86116B-8475-40A0-A507-D4A7947F5F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "4D803EC9-26EE-4799-A435-C782C92739CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "6EEF87CD-2335-4886-A65C-4E33775AEC52", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "953EB81A-1B53-4A57-9F59-D4A7D37E657E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "1CB534BC-3E4D-4484-AFD0-69524B1F07F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC) podría permitir que un atacante remoto autenticado realice ataques de inyección SQL en un sistema afectado. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida adecuadamente la entrada del usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación como administrador y enviando consultas SQL manipuladas a un sistema afectado. Una explotación exitosa podría permitir al atacante obtener datos no autorizados de la base de datos y realizar cambios en el sistema. Para aprovechar esta vulnerabilidad, un atacante necesitaría privilegios de nivel de administrador.", }, ], id: "CVE-2024-20471", lastModified: "2024-11-01T18:16:35.227", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:10.773", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-11-16 07:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101862 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101862 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 2.9.9 | |
cisco | secure_firewall_management_center | 2.9.10 | |
cisco | secure_firewall_management_center | 2.9.11 | |
cisco | secure_firewall_management_center | 2.9.12 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.9:*:*:*:*:*:*:*", matchCriteriaId: "40CC4B82-5F54-49E3-921B-AB1A66D264A7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.10:*:*:*:*:*:*:*", matchCriteriaId: "6DB04A5E-4DEA-48F8-9819-3232C5CEB9DA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.11:*:*:*:*:*:*:*", matchCriteriaId: "7FEAF14A-431F-43A0-9E7E-1B8039D5B954", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.12:*:*:*:*:*:*:*", matchCriteriaId: "8532C989-889B-4DEE-8687-6C67F173E50D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección SNORT de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar omita una política de archivos que esté configurada para bloquear el protocolo Server Message Block Version 2 (SMB2). La vulnerabilidad se debe a la incorrecta detección de un archivo SMB2 cuando la detección se basa en la longitud del archivo. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición de transferencia de SMB2 manipulada al dispositivo objetivo. Un exploit con éxito podría permitir que el atacante omita filtros que están configurados para bloquear el tráfico SMB2. Cisco Bug IDs: CSCve58398.", }, ], id: "CVE-2017-12300", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-16T07:29:00.367", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101862", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101862", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-10-05 07:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101118 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101118 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.1 | |
cisco | secure_firewall_management_center | 6.0.1.3 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.1.0.3 | |
cisco | secure_firewall_management_center | 6.1.0.6 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.0.2 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.3:*:*:*:*:*:*:*", matchCriteriaId: "9D184D6D-D695-48D5-90E6-95185C1D397D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.", }, { lang: "es", value: "Una vulnerabilidad en el descifrado de tráfico SSL para Cisco Firepower Threat Defense (FTD) Software podría permitir que un atacante remoto no autenticado provoque el vaciado de la memoria del sistema. Esto también se conoce como Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. Si este filtrado de memoria se mantiene durante mucho tiempo, se podría provocar una denegación de servicio (DoS), ya que el tráfico podría dejar de ser reenviado a través del dispositivo. La vulnerabilidad se debe a un error en la forma en que Firepower Detection Snort Engine gestiona el descifrado del tráfico SSL y las notificaciones a y desde el controlador Adaptive Security Appliance (ASA). Un atacante podría explotar esta vulnerabilidad enviando un flujo constante de tráfico SSL (Secure Sockets Layer) a través del dispositivo. Un exploit podría permitir que el atacante provocase una condición DoS cuando el dispositivo se ejecuta con poca memoria del sistema. Esta vulnerabilidad afecta a las versiones 6.0.1 y siguientes de Cisco Firepower Threat Defense (FTD) Software que se ejecuten en cualquiera de estos productos Cisco: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.", }, ], id: "CVE-2017-12245", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-10-05T07:29:00.307", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101118", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-10-31 19:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "249F9108-758A-4118-94C1-BAC747AF45ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20273", lastModified: "2024-10-31T19:09:24.687", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:14.813", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-01 18:22
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 7.3.0 | |
cisco | secure_firewall_management_center | 7.3.1 | |
cisco | secure_firewall_management_center | 7.3.1.1 | |
cisco | secure_firewall_management_center | 7.3.1.2 | |
cisco | secure_firewall_management_center | 7.4.0 | |
cisco | secure_firewall_management_center | 7.4.1 | |
cisco | secure_firewall_management_center | 7.4.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC) podría permitir que un atacante remoto autenticado realice ataques de inyección SQL en un sistema afectado. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida adecuadamente la entrada del usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación como administrador y enviando consultas SQL manipuladas a un sistema afectado. Una explotación exitosa podría permitir al atacante obtener datos no autorizados de la base de datos y realizar cambios en el sistema. Para aprovechar esta vulnerabilidad, un atacante necesitaría privilegios de nivel de administrador.", }, ], id: "CVE-2024-20472", lastModified: "2024-11-01T18:22:41.030", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:11.007", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 18:15
Modified
2024-11-26 16:09
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "8C8ECB61-27AB-49B9-8201-AD36C3E924B0", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema operativo subyacente. Para aprovechar estas vulnerabilidades, el atacante debe tener credenciales de dispositivo válidas, pero no necesita privilegios de administrador. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario para ciertas opciones de configuración. Un atacante podría aprovechar estas vulnerabilidades utilizando entradas manipuladas dentro de la GUI de configuración del dispositivo. Un exploit exitoso podría permitir al atacante ejecutar comandos arbitrarios en el dispositivo, incluido el sistema operativo subyacente, lo que también podría afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2023-20220", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T18:15:09.523", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-16 17:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing. The vulnerability is due to improper handling of traffic when the Secure Sockets Layer (SSL) inspection policy is enabled. An attacker could exploit this vulnerability by sending malicious traffic through an affected device. An exploit could allow the attacker to increase the resource consumption of a single instance of the Snort detection engine on an affected device. This will lead to performance degradation and eventually the restart of the affected Snort process. Cisco Bug IDs: CSCvi09219, CSCvi29845.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104728 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104728 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0.7 | |
cisco | secure_firewall_management_center | 6.2.0.5 | |
cisco | secure_firewall_management_center | 6.2.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing. The vulnerability is due to improper handling of traffic when the Secure Sockets Layer (SSL) inspection policy is enabled. An attacker could exploit this vulnerability by sending malicious traffic through an affected device. An exploit could allow the attacker to increase the resource consumption of a single instance of the Snort detection engine on an affected device. This will lead to performance degradation and eventually the restart of the affected Snort process. Cisco Bug IDs: CSCvi09219, CSCvi29845.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar provoque que uno de los procesos del motor de detección se quede sin memoria y, así, ralentice el procesamiento de tráfico. La vulnerabilidad se debe a la gestión incorrecta de tráfico cuando la política de inspección SSL (Secure Sockets Layer) está habilitada. Un atacante podría explotar esta vulnerabilidad enviando tráfico malicioso a través del dispositivo afectado. Su explotación podría permitir que el atacante aumente el consumo de recursos de una sola instancia del motor de detección de Snort en un dispositivo afectado. Esto conducirá a una degradación del rendimiento y, finalmente, al reinicio del proceso Snort afectado. Cisco Bug IDs: CSCvi09219, CSCvi29845.", }, ], id: "CVE-2018-0370", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-16T17:29:00.533", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104728", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104728", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-16 02:29
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108340 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108340 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.0.5 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.2.3.1 | |
cisco | secure_firewall_management_center | 6.2.3.2 | |
cisco | secure_firewall_management_center | 6.4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.", }, { lang: "es", value: "Una vulnerabilidad en el motor de detección del software Firepower Threat Defense (FTD) de Cisco, podría permitir a un atacante remoto no autorizado omitir las políticas de control de acceso configuradas. La vulnerabilidad es debido a la comprobación inapropiada de los paquetes ICMP. Un atacante podría explotar esta vulnerabilidad enviando paquetes ICMP creados hacia el dispositivo afectado. Una explotación con éxito podría permitir al atacante omitir las políticas de control de acceso configuradas.", }, ], id: "CVE-2019-1832", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-16T02:29:00.327", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108340", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108340", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-11-01 17:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "3C86116B-8475-40A0-A507-D4A7947F5F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "4D803EC9-26EE-4799-A435-C782C92739CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "6EEF87CD-2335-4886-A65C-4E33775AEC52", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "953EB81A-1B53-4A57-9F59-D4A7D37E657E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "1CB534BC-3E4D-4484-AFD0-69524B1F07F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:*", matchCriteriaId: "2B33F953-FEF3-4C46-A12A-2A42D8339D6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC), anteriormente Firepower Management Center Software, podría permitir que un atacante remoto autenticado realice un ataque de inyección SQL contra un dispositivo afectado. Para aprovechar esta vulnerabilidad, un atacante debe tener una cuenta válida en el dispositivo con el rol de aprobador de seguridad, administrador de intrusiones, administrador de acceso o administrador de red. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administración basada en web de un dispositivo afectado. Una explotación exitosa podría permitir al atacante leer el contenido de las bases de datos en el dispositivo afectado y también obtener acceso de lectura limitado al sistema operativo subyacente.", }, ], id: "CVE-2024-20340", lastModified: "2024-11-01T17:40:30.980", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:18.300", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v", }, { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "8F90C934-5556-479B-873B-CC32F77B7BEC", versionEndExcluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.4:*:*:*:*:*:*:*", matchCriteriaId: "639305A6-4FEA-4BA5-AB9A-3B222AF45A9A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", matchCriteriaId: "41206465-375A-4368-B390-8C629251D597", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:16.11.2:*:*:*:*:*:*:*", matchCriteriaId: "76CAC6C9-6016-41B2-ADAB-0FF15E36BD43", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:17.3.1:*:*:*:*:*:*:*", matchCriteriaId: "E1ECD4BE-D7E3-4A07-B354-9E6E3B942463", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "62081293-8355-4197-A5A8-1E434B808680", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isa-3000-2c2f-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "DC504D67-ABE7-4DA4-97DD-3D3EEE5D5208", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isa-3000-4c-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "4D7A3FA6-CAAB-4F64-8EC8-B12FE45D8E22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad en el motor de detección Snort que podría permitir a un atacante remoto no autenticado omitir las políticas de archivos configuradas sobre un sistema afectado. La vulnerabilidad es debido a errores en como el motor de detección Snort maneja respuestas HTTP específicas. Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes HTTP diseñados que fluirían por medio de un sistema afectado. Una explotación con éxito podría permitir a un atacante omitir las políticas de archivos configuradas y entregar una carga maliciosa a la red protegida.", }, ], id: "CVE-2020-3315", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.823", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-668", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-05-28 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 5.4.0.2 | |
cisco | secure_firewall_management_center | 5.4.1 | |
cisco | secure_firewall_management_center | 5.4.1.1 | |
cisco | secure_firewall_management_center | 5.4.1.2 | |
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 5.4.1.4 | |
cisco | secure_firewall_management_center | 5.4.1.5 | |
cisco | secure_firewall_management_center | 5.4.1.6 | |
cisco | secure_firewall_management_center | 6.0.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "DE5CF68A-AAF1-4103-AD83-E2192785B31B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*", matchCriteriaId: "AA8E3657-BC3D-4A7D-8523-0D64F69CFE8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.", }, { lang: "es", value: "La interfaz web en Cisco Firepower Management Center 5.4.0 hasta la versión 6.0.0.1 permite a usuarios remotos autenticados modificar páginas colocando código manipulado en un valor de parámetro, también conocida como Bug ID CSCuy76517.", }, ], id: "CVE-2016-1413", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-05-28T01:59:02.290", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-94", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12679", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.453", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-29 18:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "634D4E3D-4FAB-46BC-9D9D-E6AFCFB26B17", versionEndIncluding: "6.4.0.11", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3B093C12-8118-45D4-B044-621E5228BB9F", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4EF7D3CA-AA84-46D8-9386-C8672FCDB090", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2021-1455", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T18:15:09.043", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-03 16:29
Modified
2024-11-26 16:09
Severity ?
6.0 (Medium) - CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108156 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108156 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | 6.0.0 | |
cisco | firepower_threat_defense | 6.0.1 | |
cisco | firepower_threat_defense | 6.1.0 | |
cisco | firepower_threat_defense | 6.2.0 | |
cisco | firepower_threat_defense | 6.2.1 | |
cisco | firepower_threat_defense | 6.2.2 | |
cisco | firepower_threat_defense | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "E1AC6A67-82EF-4D31-AFCB-499A0C6EC0F8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "995667FD-35F1-49E5-96DB-2FDFF5E0B523", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "61FB47CF-2A6A-4121-BFF7-5862E163B8E5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "1DC52A8B-7DF4-47B2-9F49-627F59656E5E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "AD48BE40-C647-429A-81B6-59E125BBE415", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "42496A5B-1644-4088-BBCF-2ED810A5694B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "1D726F07-06F1-4B0A-B010-E607E0C2A280", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.", }, { lang: "es", value: "\"Una vulnerabilidad en la CLI del software Firepower Threat Defense (FTD) de Cisco podría permitir a un atacante local identificado ejecutar un ataque de inyección de comando. La vulnerabilidad es debido a la insuficiente comprobación de entrada. Un atacante podría aprovechar esta vulnerabilidad al inyectar comandos dentro de argumentos para un comando específico. Una operación éxito podría permitir al atacante ejecutar comandos con privilegios root.", }, ], id: "CVE-2019-1709", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.8, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-03T16:29:00.740", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108156", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108156", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-06-21 11:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvb19750.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104519 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104519 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B5D4D8D5-BA8F-4CB6-A435-B50903841C9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "9DB0079A-2ADD-42FF-A909-FEC1BC2331C1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "6AD50DD0-1B7E-4691-A134-82E05EAD40BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "76FB5DAC-47D4-419E-8926-B750C4A68EBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "056C6875-D0D5-4597-9E03-32496BA581D4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8360_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "ADF9BB4E-6E26-4409-9BCA-1134D28480DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8360:*:*:*:*:*:*:*:*", matchCriteriaId: "7409BD90-9739-4123-AECF-221F0E0414D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "70A373BF-C69B-4A7B-BDFF-3F841537C233", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6C113FF8-1730-42DF-8DB8-B68DBC1B2720", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "A4F8CC13-77BD-43F5-8C13-96AEE45DDBBA", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "4B13AC28-443B-459C-920D-D0DC788469BE", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "097D95BE-292C-4E69-BCB2-D1660D58D9CE", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "608FBE2E-4F2D-44E0-B339-B204ECCC17CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_2500:*:*:*:*:*:*:*:*", matchCriteriaId: "92DBD26B-87CE-4437-A5C8-A1DDEFECFAF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C18E1BF9-F5C2-4AC6-8C18-F6519E4969DE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "D864031C-5651-4DFF-80B3-AFE851B9EEB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "399B632E-1A30-4356-A2A1-F6CC511649C5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "24950812-1217-467E-9BD8-0BF89B17C8B2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "0383E73D-CD1C-478F-986A-4A35DBFE5740", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8120_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "DF87010A-1A3A-4056-A12D-356268C7A934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8120:*:*:*:*:*:*:*:*", matchCriteriaId: "C88D9FD9-1171-44EA-B756-62E2BBC127DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "2A970F3D-49B9-4B0C-8294-C9F9DACC7D37", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "14FD26AB-EF68-46F0-B6AC-3459861FFA54", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "5C0A18D2-BE0E-4B4B-B2E8-4F76EAD77CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "7980F8A9-DD98-466F-9F63-AFA98ED2091D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "A9B6D15A-88D4-4557-8C00-0E4D1BCA9954", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8260_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "AFEA4785-6875-486A-BA8C-1A619B375465", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8260:*:*:*:*:*:*:*:*", matchCriteriaId: "2DB919F7-E1EF-498E-8707-E062AD006260", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "4E5C734C-C02D-4E93-8655-07CDCF9C8294", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "7D9B64CC-5C06-4DE9-94FC-FB16BA758E24", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "823C3EDE-19CC-4B9C-B40F-6241D8E19DB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "B0F81598-B000-450E-961B-9CC3D9889A35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E5886EDA-F7EC-4933-A02E-DBF12C7ED1C1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7050_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "19493C92-3474-4522-ACDB-BC8C10555369", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7050:*:*:*:*:*:*:*:*", matchCriteriaId: "7217BCEE-5C6D-4EEB-82A0-75E3F16ECE34", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D35475FF-0239-4147-B06F-0A60BD836CD7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "E3246E18-3112-4D80-8E21-C87F6AA4936C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9F23304D-43DB-46BE-9640-087054D26F3A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "3E57F396-9072-4F0C-8B3F-703183F76556", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "967B4433-9829-488A-B53D-FB42010AB087", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8130_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "AC34DC11-24DA-4803-BF5B-44F47DB538DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8130:*:*:*:*:*:*:*:*", matchCriteriaId: "6977E3E8-10BA-404D-9B66-0A9BEC9F52F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C3F44813-6078-4B23-BF6D-D59AAEA337E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "D84D03E4-FCCE-4938-AC2D-52515FB74733", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "05D24EB0-27C3-4A50-85E6-56DD84927565", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "4CA79502-3725-4D05-9EF2-ECD8712B6106", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "DFE04EE5-42A3-4469-9278-61FD12B860E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8140_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "9500773A-6A58-4F93-8F92-817E01DBCEB3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8140:*:*:*:*:*:*:*:*", matchCriteriaId: "C9D39C95-ADAF-4D42-8CA4-164336734493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "1DDCC721-3D93-473F-A9F5-DDCC87DC45FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "7C317972-C371-437C-95B5-5174C44BAC6D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "4D4C411A-DFEE-4FEB-A70B-3EEB6633A455", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "D03121C3-4AE4-464E-8FE3-22810B6D2AB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "6A7B2EC3-B938-4C5F-A16D-B79DC62DEFC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8350_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "AA91048C-134F-451C-8174-3DA67EE1E1C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8350:*:*:*:*:*:*:*:*", matchCriteriaId: "9603A10C-F404-4C3B-9078-94AF82E18F69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "66AD4B4B-DE12-4A17-BBCE-1B8BBFC4CA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "592ED66B-EAFB-45B6-82DA-6F9936FDBE86", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "1AFBBB59-1C19-48EC-A186-1B855969FF04", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "9F1A168B-34A8-468E-A6F2-65986F333B35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "63A7BF21-6CAA-4EA3-A4B5-AB625C5D3C91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_8150_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6B35BD06-A9C3-4E39-9EAA-5EF81FF2DED1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:amp_8150:*:*:*:*:*:*:*:*", matchCriteriaId: "785EE03B-06DF-49FD-BBB6-A1FF4516F636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "74395E25-4BCF-4B7E-942C-E2CD5A44C566", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "858224D4-7C1C-411D-9F44-72454ABFA3AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "743C282D-2647-4590-BB77-10DE43D63A77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "0449770D-3F8F-44FC-A1C5-9213A90B5605", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "81C5B380-7C78-4B84-8F82-E24C013AE885", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:amp_7150_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "75D07DA5-ECA5-4B3B-AB35-9AA1EEFDC874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:amp_7150:*:*:*:*:*:*:*:*", matchCriteriaId: "E48337C6-F7D5-4F46-9E89-EB4C94923E35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "8EB1DAD8-AE09-4F34-B5AC-C4F4FF826458", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "CC967F9E-F8F2-42CC-8EFF-13E9E5F6B9AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "C4BE454E-AEA2-459F-B66E-8F3F7260B162", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "E4FB8F07-FEEB-4A11-8345-AEC6793FA939", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "596C0456-7CA6-4B96-AE15-49C48C8A0D89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8270_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "96BD58DA-60FD-43EC-967E-2EFD9624951B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8270:*:*:*:*:*:*:*:*", matchCriteriaId: "F31BAAF0-C52D-482E-96B2-8473FF8759F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "926419AE-4764-4AB9-8A2E-A65C3522D93F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "EC211528-D057-462F-8E7C-0964DB20C1C7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "DAE53F9A-B34F-4C5F-9939-EFF6D404F17E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "7DA3FF59-EF43-4374-86A2-079BFF448C3C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "590FFF29-8788-4645-B45C-D06C6469D4AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ngips_virtual_appliance:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6445BB5A-7425-4A8E-BF77-9CC248C6CD09", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "62AFC266-8BB4-4884-97A0-17E386E1ACF5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "E868722D-EDA7-48CF-A4DE-4B9B8A04D167", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0901B745-9129-41E5-B13E-8446FBBFB2BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2A24300F-453F-465E-BA5A-BC06F5AD3E78", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "93DEA727-4CBB-4C09-B006-072D6954D6C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8390_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "4317A474-4914-4519-B736-2E0858045F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8390:*:*:*:*:*:*:*:*", matchCriteriaId: "29BCEA7B-1CD9-48E0-902F-ED0C9347F5BB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E7621802-6474-4C8C-AC4F-E00AE417D5E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "2C2AE75A-18D3-48F0-A08F-E7AB73ECA60F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EC5D1C51-23A4-44A7-833E-98EA9396CB9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "5268B256-3877-46FB-A464-9D8FCE9D9E67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "713F62E9-D85B-4538-B475-93FFD078AC83", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4500_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "15499352-7145-403C-9CFC-2A593EBD0E0A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_4500:*:*:*:*:*:*:*:*", matchCriteriaId: "4D667DD0-7548-453D-B4D4-E50671424BCD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "95859796-5335-49E9-9C63-4E2BFFC4D897", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "FA484BF6-DC47-4A9B-B653-DB31EA9235A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "BF4388A8-13AA-438E-895F-61A5E44991A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "7473F455-E586-4408-99EC-419D4B575DDF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "A2D9BDC6-7879-4DEE-9596-F28C37B2D105", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8250_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "EB1165B2-D558-4022-AD94-7723BE225D3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8250:*:*:*:*:*:*:*:*", matchCriteriaId: "247DEADB-B80D-4E55-9E5A-4884855403C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "8C05A010-6181-499C-BFA5-3967E2E4BC66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "E8A826A6-6704-4043-85AC-4937B4AD6775", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0EFA9E64-ADD8-4BA4-860A-E78B9DAD5124", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "FF4825FD-7674-415F-BA34-0922538742A4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "B876F2F4-0EBE-4CDD-8A98-D1D48B90C7B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_750_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6E9EF6E9-DD16-495B-AE55-B17061D24492", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firesight_management_center_750:*:*:*:*:*:*:*:*", matchCriteriaId: "A42683F9-CC6B-4F51-A542-2F4D6A21E0A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "DAA44CD6-F47B-48F5-A583-6F7046D54B03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "2EE53053-F3D7-4EF1-BB61-314243267CC6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0063B9D7-9B2B-4678-8A71-112AA1A2CE79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "472756FF-CAA5-43EC-BB4D-5352EA4A1DAA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "EFD70A71-7AD9-4F6C-8CA8-F4C6C1F4B9DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8370_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "DA9B4D7B-9DD1-4FE6-B112-F802140C1AAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8370:*:*:*:*:*:*:*:*", matchCriteriaId: "79E48492-E27D-48A6-8CEA-7DF7D31BAA04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "4DDBDD3E-13B3-4DE5-8B6E-C590CB56CC99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "F36CCF75-81CD-4836-95AD-08E570C111EE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "58797388-2483-4C8F-A6DB-B6C8992FEE96", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "47083124-8250-47DF-942B-5105EDD49713", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "DD537F68-DC77-4BEF-B4CE-0C478A17088E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7120_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "C2A8E47A-B1E8-47FA-A02E-005E019EB492", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7120:*:*:*:*:*:*:*:*", matchCriteriaId: "CAB65ED8-D7A2-47F2-AC4C-77C8080BA585", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "92BE2DE0-C6DE-46A2-B5E3-8062FF872BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "E9B73F3D-C120-468D-AB63-E3949D1F9FC9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "4B836DE9-DC17-45A0-B869-53D8F8D8B6CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "24F9BE44-0872-4EDC-8BDE-B957AC351DA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "07F01BE2-32D3-4A26-AD71-F532A8B93D4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7010_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "72648D12-926A-40D8-AC83-D3BDA7EBDEEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7010:*:*:*:*:*:*:*:*", matchCriteriaId: "73E5C1B0-AD6C-4CA1-9F2C-CF50A42864F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "CC3A9535-3F0E-4882-A801-41400B5C0E34", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "4409E73E-F180-45DF-848A-9F027A8CF5ED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "573DD3CF-9149-4B33-ABB7-42C4EB1FE6C1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "BD9B619A-8962-4207-8C21-9D433FEC6CA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "39C3286B-679F-4D18-8CE8-B365858DD0A6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_4000_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "4F026C5E-1E78-4403-8002-14A20BA4A2E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_4000:*:*:*:*:*:*:*:*", matchCriteriaId: "704C75F9-9051-424C-B50F-5558512F0D12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D9E76011-858F-4FBD-B5CF-22984442C90B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "4DAD2F73-BDA1-4E60-9816-A8C6A33B6394", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "21B6F485-9E3F-466B-82D3-CD854395F239", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "738DE4B9-4109-4528-B0EF-221B614E6653", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "597A1A69-D22E-465B-A45D-6E87B9ABF759", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_8290_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "70AE2BB1-E0AC-4093-97F0-DE1A52BC515E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_8290:*:*:*:*:*:*:*:*", matchCriteriaId: "50C6718F-C316-498C-8FDB-076E5305B2E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "9C1D92CA-9D24-400F-8FF3-40C0AF3F4678", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "0AECB7D6-17B6-4EE4-B979-A1B11AD7823A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "5675C323-6AA7-42A5-8BBC-8E0C64F77C7F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "A63793B2-D520-418A-91A8-4EFF070A9044", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "19DC5409-62B8-4D56-B05A-D0CD91BBAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_1500_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "38C0E54D-5AFE-46C8-AFA7-5D6F81BD3B4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firesight_management_center_1500:*:*:*:*:*:*:*:*", matchCriteriaId: "0FAAEBC7-2433-4062-B6A0-FA3F7D000098", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0EE35B34-B403-457D-95DF-48180820CA1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A46DF6DE-3C5B-4E0A-BEC4-4C5E206FB03C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "D8E00B52-C54F-4152-ADDC-1C0985C0C33A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "90B0C50A-7C40-466E-8ED8-42828BCDF079", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "43585562-8F2B-43D0-8712-889214EE32BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_1000_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "301655B8-EE04-4BBB-9965-CA5F2112B359", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_1000:*:*:*:*:*:*:*:*", matchCriteriaId: "3DEFE331-C503-49C9-845E-7D8BE502510B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "79183FCC-D7B9-4435-A966-2D30DD2EA158", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "AD7C455E-8C8F-4EB3-897B-9AAAC307DA32", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "1591CD52-E222-4EB7-8482-ECF784D79087", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "0EDC46CB-F768-4629-BDD6-61C269CCEACD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "A444CAF1-9AEC-4E3E-BFBF-ECF461EFCF47", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firesight_management_center_3500_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "E2B080FA-7436-47DA-86C7-75021E31EB8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firesight_management_center_3500:*:*:*:*:*:*:*:*", matchCriteriaId: "E875074F-E880-47B3-B098-5871DAAF610B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "1B8B2B8E-214D-45EE-83AF-B1B4DFD1133C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "099D3E49-7B9E-41B6-9913-89614083F69D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "2E16B99E-EE46-4A33-933D-C63AE6367A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "5454F348-68E0-46E2-BBE5-156BF53850AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "9FBF12C8-22CA-4C80-AE83-9338871F3134", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7125_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "9AF56EE9-F911-4FBF-A1B6-8AC7F5E53A51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7125:*:*:*:*:*:*:*:*", matchCriteriaId: "BB67B9BF-EF51-43AC-B6F7-F197586F1EFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6556A85-D1FC-41BF-B83E-7E5DFEA88EBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "EC867C82-BD1D-4760-9C63-BC552CD2038B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "59DAB3A5-6694-4F8E-80BF-3E4942349D11", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "3E1CFAEF-3524-4325-B5B2-CD1D6F6B1157", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "863A35EE-597A-42D7-A6EB-D4593A78FC4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7020_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "2F3806DE-8A3D-441A-A2F2-6393792F3ADD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7020:*:*:*:*:*:*:*:*", matchCriteriaId: "403350F3-EB94-49AA-9AC7-8A07AB4E9ACC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "010EDF8B-0304-4B12-A9ED-22A68EC685D4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B8042795-67CB-4009-8F68-9380D03282DC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "D3601C15-92C2-42CD-AFBD-AA6057C01BA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4D0AA3E-B6AE-4925-825F-1B8C8BAB7373", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "722AAF2E-1EA0-43F0-957D-CB5AE4F79F7C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7030_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "7DB2518D-3CF8-4E96-8AF3-95513429F344", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7030:*:*:*:*:*:*:*:*", matchCriteriaId: "DA825BB1-BC07-4D3B-9B99-1D79B83AA9ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "3B1E9222-9F21-44A4-9756-9F6208179851", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "AC91F5B1-205B-4611-A410-E484C79EA541", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "AFB7B9EC-121D-4232-942B-27F25E8FF5DE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C135F894-EF31-45E5-B216-E76585DD3C44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "0A1008EB-9260-41F4-B872-7905B3B912C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7110_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "C0A1E22E-1BF6-4474-9CD6-F3796D0F5CA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7110:*:*:*:*:*:*:*:*", matchCriteriaId: "CDB31564-E16E-4F9D-98F9-69E385A2E20A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "81CFF735-FC02-41B4-842C-C0BDCE9E9F89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "2AF574BB-0702-4E58-81EF-542BFD6CDC7B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0CF6F7B5-689C-49CC-BE05-9C784EFCD969", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "97EFFE63-E678-4032-BB46-AD3C6A045AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "CE945FC9-D465-4235-916D-02E7645CED15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_management_center_2000_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "06858A18-714A-46A4-8B05-606D62A95D05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_management_center_2000:*:*:*:*:*:*:*:*", matchCriteriaId: "FB6A66B4-3278-4298-9225-2EE4934BE64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E9ED1DD0-91C4-4A51-BADA-0E2ED5D538AA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A08538C5-6957-42B4-894B-1AF04FC904A7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "01DFAA87-6DB1-419B-A2F4-F1FB3A7B8A18", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "523CA917-8C2E-400A-9442-1ED8E642FC1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "85573FFB-510F-424B-99E1-ADE7038C9354", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "F75D9CB4-406B-4FBF-BC7A-35C2CCEFD8B2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C6E75089-32EA-4428-882D-EFF67EE0452F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "BA255CF6-7DF8-48A9-8BE6-86ABD5B5FDB9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "D10A0151-883A-4C70-A4ED-4BCEF44276D6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1117C464-B0BB-45A5-9C54-3565822C9304", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "A3C57A41-5581-41BF-B4BF-449E48B91917", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:firepower_appliance_7115_firmware:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "F2F1E4BB-A41B-4BA1-BFAA-09E8AD2CF024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_appliance_7115:*:*:*:*:*:*:*:*", matchCriteriaId: "ABBEC97D-FE29-41D7-8BF3-0FEBBEC1A69C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvb19750.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión basada en web de Cisco Firepower Management Center podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Request Forgery (CSRF) y realizar acciones arbitrarias en un dispositivo afectado. La vulnerabilidad se debe a la medidas de protección contra CSRF insuficientes para la interfaz de administración web de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad haciendo que un usuario de la interfaz siga un enlace malicioso. Su explotación con éxito podría permitir que el atacante realice acciones arbitrarias en un dispositivo objetivo mediante un navegador web y con los privilegios del usuario. Cisco Bug IDs: CSCvb19750.", }, ], id: "CVE-2018-0365", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-21T11:29:01.133", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104519", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104519", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3782E2FD-3E18-4D96-B243-42B6F8A0C883", versionEndIncluding: "6.2.3.16", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "129717CC-A91F-4F05-8096-E9CABDFE6F6F", versionEndIncluding: "6.3.0.5", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FB852BE9-C84E-4BE7-A74F-A65166974BE6", versionEndIncluding: "6.4.0.9", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F687AF0D-BC58-4B9B-85CD-08C6BDD3C101", versionEndIncluding: "6.5.0.4", versionStartIncluding: "6.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC) Software, podría permitir a un atacante remoto no autenticado redireccionar a un usuario a una página web maliciosa. La vulnerabilidad es debido a una comprobación de entrada inapropiada de los parámetros de una petición HTTP. Un atacante podría explotar esta vulnerabilidad al interceptar una petición HTTP de un usuario. Una explotación con éxito podría permitir a un atacante modificar la petición HTTP para causar que la interfaz redireccione al usuario hacia una URL maliciosa específica. Este tipo de vulnerabilidad se conoce como ataque de redireccionamiento abierto y se utiliza en ataques de phishing que hacen que los usuarios visiten sitios maliciosos sin saberlo", }, ], id: "CVE-2020-3558", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:17.700", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-601", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-601", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3EABB3BD-4AF7-4FC1-9090-19B07F1B578D", versionEndExcluding: "6.2.3.16", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "7960516D-9A46-41EE-A0FE-E139A64DD62C", versionEndExcluding: "6.3.0.6", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "970816D7-3FC8-430A-BEFB-D8F3E5F84301", versionEndExcluding: "6.4.0.7", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FBC14B4B-D535-49DF-ABA2-BB4057A4BC47", versionEndExcluding: "6.5.0.2", versionStartIncluding: "6.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto no autenticado omitir la autenticación y ejecutar acciones arbitrarias con privilegios administrativos en un dispositivo afectado. La vulnerabilidad es debido al manejo inapropiado de las respuestas de autenticación Lightweight Directory Access Protocol (LDAP) de un servidor de autenticación externo. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones HTTP diseñadas hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante obtener acceso administrativo a la interfaz de administración basada en web del dispositivo afectado", }, ], id: "CVE-2019-16028", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-23T01:15:14.207", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-10-31 19:36
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "3C86116B-8475-40A0-A507-D4A7947F5F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "4D803EC9-26EE-4799-A435-C782C92739CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "6EEF87CD-2335-4886-A65C-4E33775AEC52", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "953EB81A-1B53-4A57-9F59-D4A7D37E657E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "1CB534BC-3E4D-4484-AFD0-69524B1F07F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20364", lastModified: "2024-10-31T19:36:32.277", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:05.427", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross Site Scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del dashboard de FMC.", }, ], id: "CVE-2022-20932", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:33.007", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-01 18:07
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system as root.
This vulnerability is due to insufficient input validation of certain HTTP requests. An attacker could exploit this vulnerability by authenticating to the web-based management interface of an affected device and then sending a crafted HTTP request to the device. A successful exploit could allow the attacker to execute arbitrary commands with root permissions on the underlying operating system of the Cisco FMC device or to execute commands on managed Cisco Firepower Threat Defense (FTD) devices. To exploit this vulnerability, the attacker would need valid credentials for a user account with at least the role of Security Analyst (Read Only).
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "6E255975-F952-43AB-A577-B8D331DDB3AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "249F9108-758A-4118-94C1-BAC747AF45ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "3C86116B-8475-40A0-A507-D4A7947F5F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "4D803EC9-26EE-4799-A435-C782C92739CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "6EEF87CD-2335-4886-A65C-4E33775AEC52", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "953EB81A-1B53-4A57-9F59-D4A7D37E657E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "1CB534BC-3E4D-4484-AFD0-69524B1F07F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:*", matchCriteriaId: "2B33F953-FEF3-4C46-A12A-2A42D8339D6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system as root.\r\n\r This vulnerability is due to insufficient input validation of certain HTTP requests. An attacker could exploit this vulnerability by authenticating to the web-based management interface of an affected device and then sending a crafted HTTP request to the device. A successful exploit could allow the attacker to execute arbitrary commands with root permissions on the underlying operating system of the Cisco FMC device or to execute commands on managed Cisco Firepower Threat Defense (FTD) devices. To exploit this vulnerability, the attacker would need valid credentials for a user account with at least the role of Security Analyst (Read Only).", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC), anteriormente Firepower Management Center Software, podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema operativo subyacente como superusuario. Esta vulnerabilidad se debe a una validación de entrada insuficiente de ciertas solicitudes HTTP. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la interfaz de administración basada en web de un dispositivo afectado y luego enviando una solicitud HTTP manipulada al dispositivo. Una explotación exitosa podría permitir al atacante ejecutar comandos arbitrarios con permisos superusuario en el sistema operativo subyacente del dispositivo Cisco FMC o ejecutar comandos en dispositivos Cisco Firepower Threat Defense (FTD) administrados. Para aprovechar esta vulnerabilidad, el atacante necesitaría credenciales válidas para una cuenta de usuario con al menos el rol de analista de seguridad (solo lectura).", }, ], id: "CVE-2024-20424", lastModified: "2024-11-01T18:07:44.057", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:09.930", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F62A86D8-58DA-487A-BB48-30F4879AE9A3", versionEndExcluding: "7.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.", }, { lang: "es", value: "Una vulnerabilidad en los mecanismos de protección de entrada del software Cisco Firepower Management Center (FMC) podría permitir a un atacante remoto autenticado visualizar datos sin autorización apropiada. Esta vulnerabilidad se presenta debido a un mecanismo de protección que es basado en la existencia o los valores de una entrada específica. Un atacante podría explotar esta vulnerabilidad al modificar esta entrada para omitir el mecanismo de protección y vulnerabilidad mediante el envío de una petición diseñada a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar datos más allá del alcance de su autorización", }, ], id: "CVE-2022-20744", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:09.437", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-807", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-10-31 19:04
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | - | |
cisco | secure_firewall_management_center | 7.1.0 | |
cisco | secure_firewall_management_center | 7.1.0.1 | |
cisco | secure_firewall_management_center | 7.1.0.2 | |
cisco | secure_firewall_management_center | 7.1.0.3 | |
cisco | secure_firewall_management_center | 7.2.0 | |
cisco | secure_firewall_management_center | 7.2.0.1 | |
cisco | secure_firewall_management_center | 7.2.1 | |
cisco | secure_firewall_management_center | 7.2.2 | |
cisco | secure_firewall_management_center | 7.2.3 | |
cisco | secure_firewall_management_center | 7.2.3.1 | |
cisco | secure_firewall_management_center | 7.2.4 | |
cisco | secure_firewall_management_center | 7.2.4.1 | |
cisco | secure_firewall_management_center | 7.2.5 | |
cisco | secure_firewall_management_center | 7.2.5.1 | |
cisco | secure_firewall_management_center | 7.2.5.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*", matchCriteriaId: "DAEC54E5-91D8-48AB-A890-5841A158839F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20264", lastModified: "2024-10-31T19:04:42.863", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:14.180", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-20 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.1 | |
cisco | secure_firewall_management_center | 6.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AF40DB44-C213-466E-B473-B07B30A42B34", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.", }, { lang: "es", value: "Una vulnerabilidad en el análisis del motor de detección de los paquetes de protocolo Pragmatic General Multicast (PGM) para Cisco Firepower System Software podría permitir a un atacante remoto no autenticado, provocar una condición de denegación de servicio (DoS) debido a que el proceso de Snort se reinicia inesperadamente. La vulnerabilidad se debe a una validación incorrecta de entrada de los campos en el paquete de protocolo PGM. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete PGM manipulado para el motor de detección en el dispositivo de destino. Un exploit podría permitir que el atacante provocara una condición DoS si el proceso de Snort se reinicia y se anula la inspección de tráfico o se baja el tráfico. Esta vulnerabilidad afecta a Cisco Firepower System Software que tiene configuradas una o más políticas de acción de archivo y se ejecuta en cualquiera de los siguientes productos de Cisco: Adaptive Security Appliance (ASA) 5500-X Series con FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) para Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) para Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense para Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) para VMware. Versiones fijas: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.", }, ], id: "CVE-2016-6368", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-20T22:59:00.197", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/97932", }, { source: "psirt@cisco.com", url: "http://www.securityfocus.com/bid/98292", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/97932", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/98292", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-10-31 19:25
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 7.3.0 | |
cisco | secure_firewall_management_center | 7.3.1 | |
cisco | secure_firewall_management_center | 7.3.1.1 | |
cisco | secure_firewall_management_center | 7.3.1.2 | |
cisco | secure_firewall_management_center | 7.4.0 | |
cisco | secure_firewall_management_center | 7.4.1 | |
cisco | secure_firewall_management_center | 7.4.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20298", lastModified: "2024-10-31T19:25:31.523", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:15.710", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-29 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "634D4E3D-4FAB-46BC-9D9D-E6AFCFB26B17", versionEndIncluding: "6.4.0.11", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3B093C12-8118-45D4-B044-621E5228BB9F", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4EF7D3CA-AA84-46D8-9386-C8672FCDB090", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2021-1457", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T18:15:09.117", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential.
This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential.
This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_services_software_for_asa | - | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_services_software_for_asa:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C5EF69-498C-4433-8B86-91EB343C3F63", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1ED1366-633E-42A7-8EB7-65F1AA919FBA", versionEndExcluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential.\r\n\r This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential.\r\n\r This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed.", }, { lang: "es", value: "Una vulnerabilidad en Simple Network Management Protocol (SNMP) para el módulo FirePOWER con control de acceso para Cisco FirePOWER Software para Adaptive Security Appliance (ASA), el software Cisco Firepower Management Center (FMC) y el software Cisco Next-Generation Intrusion Prevention System (NGIPS) podría permitir un atacante remoto no autenticado realice una solicitud GET SNMP utilizando una credencial predeterminada. Esta vulnerabilidad se debe a la presencia de una credencial predeterminada para SNMP versión 1 (SNMPv1) y SNMP versión 2 (SNMPv2). Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud GET SNMPv1 o SNMPv2 a un dispositivo afectado. Un exploit exitoso podría permitir al atacante recuperar información confidencial del dispositivo utilizando la credencial predeterminada. Este ataque sólo tendrá éxito si se configura SNMP y el atacante sólo puede realizar solicitudes GET de SNMP; No se permite el acceso de escritura mediante SNMP.", }, ], id: "CVE-2022-20918", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:29.820", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-29 18:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "634D4E3D-4FAB-46BC-9D9D-E6AFCFB26B17", versionEndIncluding: "6.4.0.11", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "3B093C12-8118-45D4-B044-621E5228BB9F", versionEndExcluding: "6.6.3", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4EF7D3CA-AA84-46D8-9386-C8672FCDB090", versionEndExcluding: "6.7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2021-1458", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T18:15:09.157", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-19 20:29
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000, Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103930 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103930 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000, Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad SSL (Secure Sockets Layer) de reensamblado de paquetes del motor de detección en Cisco Firepower System Software podría permitir que un atacante remoto no autenticado provoque que el motor de detección consuma memoria del sistema en exceso en un dispositivo afectado, lo que podría provocar una condición de denegación de servicio (DoS). La vulnerabilidad se debe a que el software afectado gestiona incorrectamente los cambios en los estados de conexión SSL. Un atacante podría explotar esta vulnerabilidad enviando conexiones SSL manipuladas a través de un dispositivo afectado. Una explotación exitosa podría permitir al atacante provocar que el motor de detección consuma memoria del sistema en exceso en el dispositivo afectado, lo que podría provocar una denegación de servicio (DoS). El dispositivo podría necesitar volver a cargarse manualmente para que se recupere. Esta vulnerabilidad afecta a Cisco Firepower System Software Releases 6.0.0 y posteriores, ejecutándose en cualquiera de estos productos de Cisco: Adaptive Security Appliance (ASA) 5500-X Series Firewalls con FirePOWER Services, Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances, Firepower 4100 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, Firepower 9300 Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance 3000 y Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve23031.", }, ], id: "CVE-2018-0233", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-19T20:29:00.580", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103930", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103930", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "86EBE0DC-3ABA-4F4E-9343-1EAFB6E4BD4A", versionEndExcluding: "6.2.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto autenticado realizar un ataque de salto de directorio en un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente por parte de la interfaz de administración basada en web. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada hacia la interfaz de administración basada en web. Una explotación con éxito podría permitir al atacante omitir las restricciones de seguridad del Software Cisco FMC y conseguir acceso al sistema de archivos subyacente del dispositivo afectado.", }, ], id: "CVE-2019-12691", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.263", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Stored Cross-Site Scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información sensible basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20833", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:23.973", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Stored Cross-Site Scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información sensible basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20834", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:24.270", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20840", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:26.993", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | - | |
cisco | vdb_fingerprint_database | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*", matchCriteriaId: "DAEC54E5-91D8-48AB-A890-5841A158839F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vdb_fingerprint_database:*:*:*:*:*:*:*:*", matchCriteriaId: "1B280070-D45F-4DD8-9190-5978DB69098F", versionEndExcluding: "327", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad de inspección de archivos y malware del Software Cisco Firepower Management Center (FMC), podría permitir a un atacante remoto no autenticado omitir las políticas de inspección de archivos y malware en un sistema afectado. La vulnerabilidad se presenta porque el software afectado no comprueba suficientemente el tráfico entrante. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada por medio de un dispositivo afectado. Una explotación con éxito podría permitir al atacante omitir las políticas de inspección de archivos y malware y enviar tráfico malicioso a través del dispositivo afectado.", }, ], id: "CVE-2019-12701", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:13.890", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "72B91784-38A9-4A2A-AA92-8AB558924BBD", versionEndExcluding: "17.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "BF8B0B49-2C99-410B-B011-5B821C5992FB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*", matchCriteriaId: "9510E97A-FD78-43C6-85BC-223001ACA264", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "4AFD5C16-FA94-4FDA-9378-F93661419098", versionEndExcluding: "6.5.0.5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", matchCriteriaId: "2986D5BD-1936-41BD-A992-7672C019F27E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.14:*:*:*:*:*:*:*", matchCriteriaId: "3D320926-6890-4A7F-85E2-7F46C2791499", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", matchCriteriaId: "42493B4F-0CF2-45F0-B72D-36F0597CC274", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", matchCriteriaId: "06F2E7D8-BB95-480D-AE3E-F9B97C3A5379", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*", matchCriteriaId: "6F41C382-C849-465C-AF77-0A787CA03BA7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", matchCriteriaId: "0ADB3B5E-B17C-4D12-9ABE-1817CED279B2", versionEndExcluding: "2.9.14", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.", }, { lang: "es", value: "Múltiples productos de Cisco están afectados por una vulnerabilidad en el motor de detección de aplicaciones de Snort que podría permitir a un atacante remoto no autenticado omitir las políticas configuradas en un sistema afectado. La vulnerabilidad es debido a un fallo en el algoritmo de detección. Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes diseñados que fluirían a través de un sistema afectado. Una explotación con éxito podría permitir al atacante omitir las políticas configuradas y entregar una carga útil maliciosa a la red protegida.", }, ], id: "CVE-2021-1236", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:20.583", references: [ { source: "psirt@cisco.com", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq", }, { source: "psirt@cisco.com", url: "https://www.debian.org/security/2023/dsa-5354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5354", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-670", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-670", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12684", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.827", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-16 02:29
Modified
2024-11-26 16:09
Severity ?
5.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Summary
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108338 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108338 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.", }, { lang: "es", value: "Una vulnerabilidad en Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto no autorizado omitir las políticas configuradas. La vulnerabilidad es debido a un análisis incorrecto de atributos específicos en un encabezado de paquete TLS. Un atacante podría explotar esta vulnerabilidad enviando mensajes TLS maliciosos al sistema afectado. Una explotación exito podría permitir al atacante eludir las políticas configuradas para el sistema, lo que podría permitir que el tráfico fluya sin ser inspeccionado.", }, ], id: "CVE-2019-1833", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-16T02:29:00.373", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108338", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-693", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-693", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 17:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A2C229-3396-4411-9D39-49F53F6532CF", versionEndIncluding: "6.4.0.16", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B4500BF5-6E53-474F-A266-DFEA18880600", versionEndIncluding: "6.6.7.1", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D1E01B-8280-4011-8264-9D002C524CA1", versionEndIncluding: "7.0.5", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "75555C00-0F74-4A39-9F26-D38824D2323D", versionEndIncluding: "7.1.0.3", versionStartIncluding: "7.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "F7286D57-DA7E-4EA7-99C4-BB5A7C4DE76F", versionEndIncluding: "7.2.3.1", versionStartIncluding: "7.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "BFDB4F91-CD9E-409C-816E-B634C058FA7E", versionEndIncluding: "7.3.1.1", versionStartIncluding: "7.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2023-20074", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T17:15:10.983", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12686", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.953", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-01 18:09
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 7.3.0 | |
cisco | secure_firewall_management_center | 7.3.1 | |
cisco | secure_firewall_management_center | 7.3.1.1 | |
cisco | secure_firewall_management_center | 7.3.1.2 | |
cisco | secure_firewall_management_center | 7.4.0 | |
cisco | secure_firewall_management_center | 7.4.1 | |
cisco | secure_firewall_management_center | 7.4.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Secure Firewall Management Center (FMC) podría permitir que un atacante remoto autenticado realice ataques de inyección SQL en un sistema afectado. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida adecuadamente la entrada del usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación como administrador y enviando consultas SQL manipuladas a un sistema afectado. Una explotación exitosa podría permitir al atacante obtener datos no autorizados de la base de datos y realizar cambios en el sistema. Para aprovechar esta vulnerabilidad, un atacante necesitaría privilegios de nivel de administrador.", }, ], id: "CVE-2024-20473", lastModified: "2024-11-01T18:09:35.813", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:11.280", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 22:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the storage of proxy server credentials of Cisco Firepower Management Center (FMC) could allow an authenticated, local attacker to view credentials for a configured proxy server. The vulnerability is due to clear-text storage and weak permissions of related configuration files. An attacker could exploit this vulnerability by accessing the CLI of the affected software and viewing the contents of the affected files. A successful exploit could allow the attacker to view the credentials that are used to access the proxy server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "681AD618-9A3F-422B-96F0-BB6E38D9DE08", versionEndExcluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the storage of proxy server credentials of Cisco Firepower Management Center (FMC) could allow an authenticated, local attacker to view credentials for a configured proxy server. The vulnerability is due to clear-text storage and weak permissions of related configuration files. An attacker could exploit this vulnerability by accessing the CLI of the affected software and viewing the contents of the affected files. A successful exploit could allow the attacker to view the credentials that are used to access the proxy server.", }, { lang: "es", value: "Una vulnerabilidad en el almacenamiento de las credenciales del servidor proxy de Cisco Firepower Management Center (FMC), podría permitir a un atacante local autenticado visualizar credenciales de un servidor proxy configurado. La vulnerabilidad es debido al almacenamiento de texto sin cifrar y los permisos débiles de los archivos de configuración relacionados. Un atacante podría explotar esta vulnerabilidad mediante el acceso hacia la CLI del software afectado y al visualizar el contenido de los archivos afectados. Una explotación con éxito podría permitir al atacante visualizar las credenciales que son utilizadas para acceder al servidor proxy.", }, ], id: "CVE-2021-1126", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T22:15:14.303", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-256", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-522", }, { lang: "en", value: "CWE-732", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.\r\n \r\nThese vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podrían permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) Almacenado contra un usuario de la interfaz de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar estas vulnerabilidades insertando entradas manipuladas en varios campos de datos en una interfaz afectada. Un exploit exitoso podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador. En algunos casos, también es posible causar un impacto temporal en la disponibilidad de partes del FMC Dashboard.", }, ], id: "CVE-2022-20838", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:25.250", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.2.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web del Software Cisco Firepower Management Center (FMC), podrían permitir a un atacante remoto autenticado ejecutar inyecciones SQL arbitrarias sobre un dispositivo afectado. Estas vulnerabilidades se presentan debido a una comprobación de entrada inapropiada. Un atacante podría explotar estas vulnerabilidades mediante el envío de consultas SQL creadas a un dispositivo afectado. Una explotación con éxito podría permitir al atacante visualizar información que no está autorizado de ver, llevar a cabo cambios en el sistema que no está autorizado a realizar y ejecutar comandos dentro del sistema operativo subyacente que pueden afectar la disponibilidad del dispositivo.", }, ], id: "CVE-2019-12682", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-02T19:15:12.703", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-02-26 05:59
Modified
2025-04-12 10:46
Severity ?
Summary
The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 5.3.0.3 | |
cisco | secure_firewall_management_center | 5.3.1.3 | |
cisco | secure_firewall_management_center | 5.3.1.4 | |
cisco | secure_firewall_management_center | 5.3.1.5 | |
cisco | secure_firewall_management_center | 5.3.1.6 | |
cisco | secure_firewall_management_center | 5.3_base | |
cisco | secure_firewall_management_center | 5.4.0 | |
cisco | secure_firewall_management_center | 5.4.1 | |
cisco | secure_firewall_management_center | 5.4.1.1 | |
cisco | secure_firewall_management_center | 5.4.1.2 | |
cisco | secure_firewall_management_center | 5.4.1.3 | |
cisco | secure_firewall_management_center | 5.4.1.4 | |
cisco | secure_firewall_management_center | 5.4.1.5 | |
cisco | secure_firewall_management_center | 5.4_base | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.1 | |
cisco | secure_firewall_management_center | 6.0_base |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "E12A7E1A-DD5F-4D24-B40C-9B6A4B06B7E6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.3:*:*:*:*:*:*:*", matchCriteriaId: "B03AFE63-7D90-4092-9AB0-E05531EB0412", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.4:*:*:*:*:*:*:*", matchCriteriaId: "C06AC416-34EE-4881-8CCE-7E5CDD185364", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.5:*:*:*:*:*:*:*", matchCriteriaId: "47D22E4A-D02B-48E7-86D9-2A05A07C8A54", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.6:*:*:*:*:*:*:*", matchCriteriaId: "8695C71C-53B3-49F6-9BDD-85A45762D9D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.3_base:*:*:*:*:*:*:*", matchCriteriaId: "D75E6197-710E-415F-8E5E-E1C3D48A31B4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*", matchCriteriaId: "27EA38C1-A34F-430A-92F7-1D299F78B449", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*", matchCriteriaId: "38ACE806-3514-4D95-85DA-BAD7245011A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1898CADB-3B2B-4A3E-86DD-23A9E1A3E40F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "8D6B5ED0-0E42-45A2-BBBB-148C2BE5DD14", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*", matchCriteriaId: "0091657B-E242-4664-8F2F-85B8FCDF3EE8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "95D7DA95-E977-4D06-92C8-E4E8B464E1D2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "15B5C864-D82A-43BB-B193-CB9756A3B8BC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.4_base:*:*:*:*:*:*:*", matchCriteriaId: "9B2E1AA9-8A80-489A-8A6F-E9034E7D2A82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0_base:*:*:*:*:*:*:*", matchCriteriaId: "554F229F-A0F5-4CA9-9778-5585E01ADF6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654.", }, { lang: "es", value: "La página de inicio de sesión del dispositivo en Cisco FirePOWER Management Center 5.3 hasta la versión 6.0.0.1 permite a atacantes remotos obtener información potencialmente sensible de la versión de software mediante la lectura de los archivos de ayuda, también conocida como Bug ID CSCuy36654.", }, ], id: "CVE-2016-1342", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-02-26T05:59:01.193", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_threat_defense | * | |
cisco | secure_firewall_management_center | 6.2.2 | |
cisco | secure_firewall_management_center | 6.2.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "EBAC1652-DD0B-451A-B8CA-D55677918DE6", versionEndExcluding: "6.2.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad Image Signature Verification del Cisco Firepower Threat Defense (FTD) Software, podría permitir a un atacante remoto autenticado con credenciales de nivel de administrador instalar un parche de software malicioso sobre un dispositivo afectado. La vulnerabilidad es debido a una verificación inapropiada de firmas digitales para imágenes de parches. Un atacante podría explotar esta vulnerabilidad al diseñar un parche de software sin firmar para omitir las comprobaciones de firmas y cargarlo sobre un dispositivo afectado. Una explotación con éxito podría permitir a un atacante iniciar una imagen de parche de software malicioso.", }, ], id: "CVE-2020-3308", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.387", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-347", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-347", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-07 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/97451 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97451 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.", }, { lang: "es", value: "Una vulnerabilidad en el ensamblaje del motor de detección de los paquetes Secure Sockets Layer (SSL) para el software Cisco Firepower System podría permitir a un atacante remoto no autenticado provocar una condición de denegación de servicio (DoS) porque el proceso Snort consume un alto nivel de recursos de la CPU. Productos afectados: Esta vulnerabilidad afecta al software Cisco Firepower System que ejecuta las versiones de software 6.0.0, 6.1.0, 6.2.0 o 6.2.1 cuando el dispositivo está configurado con una directiva SSL que tiene al menos una regla que especifica el descifrado del tráfico. Más información: CSCvc58563. Lanzamientos afectados conocidos: 6.0.0 6.1.0 6.2.0 6.2.1.", }, ], id: "CVE-2017-3885", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-07T17:59:00.387", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/97451", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/97451", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-10-31 19:35
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "249F9108-758A-4118-94C1-BAC747AF45ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20269", lastModified: "2024-10-31T19:35:03.420", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:14.610", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2763D059-E717-43B8-8108-8025CDDF73EB", versionEndIncluding: "6.1.0.7", versionStartIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "5A2861D3-2CAE-448E-8A0B-822F4E730971", versionEndIncluding: "6.2.0.6", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FDB7B36E-7DA5-4690-9D21-6BFD8025766C", versionEndIncluding: "6.2.2.5", versionStartIncluding: "6.2.2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2B2802CF-8A7F-4FC6-A406-F1F26C932F3C", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "129717CC-A91F-4F05-8096-E9CABDFE6F6F", versionEndIncluding: "6.3.0.5", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "25585CDD-8917-43DD-8FE4-01CF9C7AADCA", versionEndIncluding: "6.4.0.15", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "2586C31E-6CAC-433C-90B0-6233CA28D041", versionEndIncluding: "6.5.0.5", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "8C8ECB61-27AB-49B9-8201-AD36C3E924B0", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "64116F5B-671C-46DB-A78D-AB14AAF946FD", versionEndIncluding: "6.1.0.7", versionStartIncluding: "6.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "DD237542-FED6-4013-AD9F-18891954FE05", versionEndIncluding: "6.2.0.6", versionStartIncluding: "6.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "1F74A25A-601D-470D-BA43-EA68ADD266C6", versionEndIncluding: "6.2.2.5", versionStartIncluding: "6.2.2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "D58D7217-F6F5-4B58-B59C-E5C8781C87A9", versionEndIncluding: "6.2.3.18", versionStartIncluding: "6.2.3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "EDE0C110-518D-4E51-BCEB-F4E9FC448278", versionEndIncluding: "6.3.0.5", versionStartIncluding: "6.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "874E0E13-4A9E-4296-BEE6-F5B1077411A0", versionEndIncluding: "6.4.0.15", versionStartIncluding: "6.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "171E1C5D-68C5-4BBC-AE18-D1518A1B7277", versionEndIncluding: "6.5.0.5", versionStartIncluding: "6.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", matchCriteriaId: "1110632C-526F-4025-A7BE-0CF9F37E5F9E", versionEndIncluding: "6.7.0.3", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "AD48BE40-C647-429A-81B6-59E125BBE415", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "DCD69468-8067-4A5D-B2B0-EC510D889AA0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "20AE4051-FA3B-4F0B-BD3D-083A14269FF6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "67FB5ABE-3C40-4C58-B91F-0621C2180FAC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "53909FD6-EC74-4D2F-99DA-26E70400B53F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "55FE024D-0D43-40AD-9645-8C54ECF17824", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "EC411A8D-CD39-46F5-B8FC-6753E618FAEC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BBCA75A6-0A3E-4393-8884-9F3CE190641E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "3F3C12D3-7662-46C5-9E88-D1BE6CF605E0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "046B53A0-6BC1-461A-9C28-C534CE12C4BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5D1C767F-3E06-43B7-A0CC-D51D97A053EB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "43A950B0-A7CA-4CE7-A393-A18C8C41B08E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "A7E221CB-BD0F-4AEE-8646-998B75647714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "225382DE-2919-48F4-9CC0-DE685EAAFDF4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.", }, { lang: "es", value: "Una vulnerabilidad en el procesamiento de conexiones SSH de Cisco Firepower Management Center (FMC) y el software Cisco Firepower Threat Defense (FTD) podría permitir que un atacante remoto no autenticado cause una condición de Denegación de Servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un manejo inadecuado de errores cuando no se puede establecer una sesión SSH. Un atacante podría aprovechar esta vulnerabilidad enviando una alta tasa de conexiones SSH manipuladas a la instancia. Un exploit exitoso podría permitir que el atacante provoque el agotamiento de los recursos, lo que provocaría un reinicio en el dispositivo afectado.", }, ], id: "CVE-2022-20854", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:27.867", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-755", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.
This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.\r\n\r This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado acceda a información confidencial. Esta vulnerabilidad se debe a la falta de autorización para ciertos recursos en la interfaz de administración basada en web junto con una entropía insuficiente en estos nombres de recursos. Un atacante podría aprovechar esta vulnerabilidad enviando una serie de solicitudes HTTPS a un dispositivo afectado para enumerar los recursos del dispositivo. Un exploit exitoso podría permitir al atacante recuperar información confidencial del dispositivo.", }, ], id: "CVE-2022-20941", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:34.877", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-334", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-331", }, { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-10-21 19:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "49ED2A60-CA5B-4AE7-A45B-8444353C753A", versionEndExcluding: "6.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", }, { lang: "es", value: "Múltiples vulnerabilidades en la interfaz de administración basada en web de Cisco Firepower Management Center (FMC) Software podrían permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. Estas vulnerabilidades son debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al persuadir a un usuario de la interfaz para que haga clic en un enlace diseñado. Una explotación con éxito podría permitir a un atacante ejecutar un código script arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador", }, ], id: "CVE-2020-3553", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-10-21T19:15:17.327", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-03 04:15
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * | |
cisco | secure_firewall_management_center | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "5FB4211D-6B3C-42D7-9E8D-B42CE3A13A76", versionEndExcluding: "6.6.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "A1D6092C-AFB7-49AD-9303-3BEC14315316", versionEndExcluding: "7.0.2", versionStartIncluding: "6.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "AA58257F-F024-42AB-B043-E4DFE9A169AD", versionEndExcluding: "7.1.0.1", versionStartIncluding: "7.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en la web del software Cisco Firepower Management Center (FMC) podría permitir a un atacante remoto no autenticado realizar un ataque de tipo cross-site scripting. Esta vulnerabilidad es debido a que no ha sido comprobado correctamente la entrada proporcionada por el usuario a la interfaz de administración basada en la web. Un atacante podría explotar esta vulnerabilidad al convencer a un usuario de que haga clic en un enlace diseñado para pasar una entrada maliciosa a la interfaz. Una explotación con éxito podría permitir al atacante conducir ataques de tipo cross-site scripting y conseguir acceso a información confidencial basada en el navegador", }, ], id: "CVE-2022-20740", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-03T04:15:09.250", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-80", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.
This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63128B69-61A6-4235-81EA-0EEF46C39D10", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "53316FAB-A54F-4AB8-B605-FF042B903BFD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "20F564C9-DE1F-413B-AECA-BA04024AD730", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "65C88BB0-DF6D-4F2D-8490-14136B3D5224", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "934BC069-EE48-4B76-8930-C0F15A0CD302", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "C3E7EE32-7575-415D-BEC1-3C9C459AF650", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "3D561CE0-21A6-4421-9CC9-96F55B6B4809", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6B0EB7E0-EBAD-4052-9C7E-1057835A6D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "55C748E1-1011-4DA3-B910-C4773DC18D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "B45E7C5F-83E7-4AF3-8BCD-47359881101A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "06E6DE49-80BE-4AD8-B4CD-641C6AE766AF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8C8198CC-ED8D-4365-83C3-3D0BB6539304", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "7CC7EFCC-92E1-482F-8A29-F529B6B3053B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4A52EA-D464-4855-ABEC-FD98E0F3BD97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", matchCriteriaId: "3B5233F7-5743-467C-9C59-F5C51B47184A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "550573C7-05D5-4D54-A72F-267F544A17F3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E78489EC-0B89-4D08-A945-7AD14FB3DB58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B4EC0CD5-C067-4497-B152-3566185687FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "59606432-89BA-4A27-9917-5A208DA6809E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D3ECE991-B3AE-40DF-85BB-0AF7C3AD8883", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "98AF6113-2FB4-44E4-9D84-D07FB8F98264", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9D76C1DC-F9A1-46D7-BB20-2BEDF32E7C33", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4E6A341C-9C37-4EF6-9D1D-E665FD7A5D37", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "A59543A5-07A1-419A-A615-E527E41713CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "11B3C97F-1140-492D-B41C-DEDDCC73DA31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E33E5B57-FFDB-44C5-8D27-8D66073244C9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "15EE74A3-0748-464C-AAEE-6EBC28345552", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "89968B34-70E4-4661-A099-8E81610FBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "EF981379-C3C6-45F5-AED0-BCF4AE1103BB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2C941E3C-F5C4-4C67-ACDA-5DFD44D45DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.\r\n\r This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.", }, { lang: "es", value: "Una vulnerabilidad en la función de importación de módulos de la interfaz administrativa del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado vea información confidencial. Esta vulnerabilidad se debe a una validación insuficiente de la sintaxis XML al importar un módulo. Un atacante podría aprovechar esta vulnerabilidad proporcionando un archivo XML especialmente manipulado para la función. Un exploit exitoso podría permitir al atacante leer datos confidenciales que normalmente no serían revelados.", }, ], id: "CVE-2022-20938", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:34.430", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-611", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 17:15
Modified
2024-11-01 20:14
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "249F9108-758A-4118-94C1-BAC747AF45ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "8F81F708-ACED-4E42-8CA9-116B5C4F5141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "2C78050A-A5FB-427B-BF0D-0353B240A4FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "85E76AE7-12AC-4419-AE66-43730B173B4E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "D6BD1665-7824-4D98-A930-432CBDA4EAD5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F8056E69-22FA-4935-A576-916805D90C62", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20300", lastModified: "2024-11-01T20:14:59.393", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T17:15:17.253", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-23 18:15
Modified
2024-11-26 16:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", matchCriteriaId: "9A95D8B6-2D90-4EA8-B468-356EB396A273", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "1CDEF2CC-D485-4E66-9818-7C9740F37840", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", matchCriteriaId: "2D748B16-1C2A-4E00-807F-647569C271D1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "62950A6C-8467-4215-BCD1-010B8C491714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", matchCriteriaId: "6D97494F-BA89-4E95-A01F-C2CE02505A27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4BB537CA-0E37-471E-8DD3-7710A443224A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "F9022BCA-EDBF-4FD1-B427-573CA07E5134", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", matchCriteriaId: "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3B79ABCC-C95B-45AB-BE9D-454BD8174651", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", matchCriteriaId: "A4FD7D25-704B-47EB-AF36-DC684AD07807", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", matchCriteriaId: "3D33E431-39F5-4F73-99A1-19A05A594C90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", matchCriteriaId: "579DC0CE-1CEA-449F-BF76-AD7087573ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", matchCriteriaId: "EB3E28C0-675B-4C30-B248-BE1EB5E961C4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "45B6E615-F42A-468F-8E40-AD28994B4B1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C4B08264-DA65-4BFF-A973-FF733C7325B1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "CE2A5330-8180-48CE-B22A-1CF24B7B1631", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "ACC1D72F-9542-4A62-AA90-C0E6B2095068", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "E4F3A97A-3359-40C7-95B0-2AB41C067141", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "B68BA14B-1752-4F05-9331-D556247462C3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1DE72ABB-B573-43CC-A2AC-D81807970BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "5DB186DC-6C03-4868-8218-06BEFC0CE400", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "B29670B8-F2D3-46D7-8F34-F44B320DD6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "2F04DDF5-2058-4208-A608-3673872450EA", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C9A483AC-A8CF-439C-9009-4DFAB0484BCE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "94E7D836-46E5-4CD5-8BDC-4697D915FE05", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "06220CB8-7F16-4D3C-A835-558D5F4D97ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "82917F5C-CF20-4D97-A981-FE3F8476CCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "47E42025-1D1E-4390-AC21-9A1B0FBE8D82", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "64E0FDB2-D5A4-4749-A182-B0B145DC00D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "23B58490-C403-44D5-BDB9-88FAD19ABC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DE33A280-84E4-4B5B-AB31-7A78754413F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "BA3F9410-02E1-4FE9-9A4B-E504515F4615", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "8AAAF924-1ADE-4267-9957-DF060D1D3538", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "4D02863A-1355-4FFE-A6BD-C912697774A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "1755E718-C726-442B-B203-E9536C546DF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "AB80FC39-0FCE-49F7-9A28-CE733DBB3572", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "F61496C8-9ADE-4A4E-9788-447050691727", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "E0780AD6-4F38-4400-AA63-E41879F74B68", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "52C7994F-AA17-467B-919E-A49F0CC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "9F007F6B-1EAA-468C-8159-78B020DF1E58", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", matchCriteriaId: "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D1D808CD-B030-4334-A286-9B3A1D35C61D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "0DFE9115-3E32-4A55-AB5A-83513322FE97", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "8452BA9A-F56C-48E0-BDBA-9095AF78F521", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B2CE3B06-353C-4623-9EF4-78814DCB0D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "FD968EA0-616D-4A22-A15D-C66918E71761", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "F6A97625-D39C-42D5-89E4-415A868A0972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5E4D83B4-9697-4071-AC9F-7ADC86A6B529", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AD1E4527-AAE2-4DA9-AFDA-6375839F7843", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "2ED03874-4071-4382-8A46-8B3A59E601FF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "BF84E043-DF3C-4A95-8FDA-B0FDCD795377", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B9498087-9642-4A86-B3EE-1513C55A86E2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", matchCriteriaId: "36C229AB-2851-48D4-815A-63AAB4462A24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6DA4BCFC-8237-4F5C-9863-523EE7D8619B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", matchCriteriaId: "07693A92-7D84-45A1-ACD6-D83AE41D504B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5D401072-6709-4921-8918-720F28D61E24", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C0EA3467-4205-4C41-AF24-689330F7396B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "9BE94E38-5F29-4AE1-8129-7F7582C2CC75", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad insertando una entrada manipulada en varios campos de datos en una interfaz afectada. Una explotación exitosa podría permitir al atacante ejecutar código de secuencia de comandos arbitrario en el contexto de la interfaz o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2024-20372", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-23T18:15:05.863", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-12-14 00:59
Modified
2025-04-12 10:46
Severity ?
Summary
A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/94801 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1037421 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94801 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037421 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firesight_system_software | 6.0.0 | |
cisco | firesight_system_software | 6.0.0.0 | |
cisco | firesight_system_software | 6.0.0.1 | |
cisco | firesight_system_software | 6.0.1 | |
cisco | firesight_system_software | 6.0.1.1 | |
cisco | firesight_system_software | 6.1.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.0 | |
cisco | secure_firewall_management_center | 6.0.0.1 | |
cisco | secure_firewall_management_center | 6.0.1 | |
cisco | secure_firewall_management_center | 6.0.1.1 | |
cisco | secure_firewall_management_center | 6.1.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "55D52DB0-4441-41C9-900E-DE917B0CBC91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "CB492B2E-2CE6-4D29-9D82-D40A2B9508B8", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0D032900-6B00-4F4D-A2F7-6119F113675F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "DC5565FE-174C-41C7-9462-9138BB31507D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "B764E48A-C748-4451-8E81-DD8B62B4BA9B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firesight_system_software:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "362E320D-70E9-4B51-9298-ADF612FD440F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AF40DB44-C213-466E-B473-B07B30A42B34", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B6FD6283-CC58-4864-AA24-F6C6DDE630FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6D1AFAC1-419D-4ADB-868B-1544BED58B7F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6D4EB1FD-690B-4F8C-A559-BC76CA5FDEFF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.", }, { lang: "es", value: "Una vulnerabilidad en las características de detección y bloqueo de archivos maliciosos de Cisco Firepower Management Center y Cisco FireSIGHT System Software podría permitir a un atacante remoto no autenticado eludir los mecanismos de detección de malware en un dispositivo afectado. Productos Afectados: Cisco Firepower Management Center y FireSIGHT System Software son afectados cuando están configurados para utilizar una política de archivos con la acción Block Malware. Más Información: CSCvb27494. Lanzamientos Afectados Conocidos: 6.0.1.1 6.1.0.", }, ], id: "CVE-2016-9193", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-12-14T00:59:16.973", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/94801", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1037421", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/94801", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1037421", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-15 21:15
Modified
2024-11-26 16:09
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 6.7.0 | |
cisco | secure_firewall_management_center | 6.7.0.1 | |
cisco | secure_firewall_management_center | 6.7.0.2 | |
cisco | secure_firewall_management_center | 6.7.0.3 | |
cisco | secure_firewall_management_center | 7.0.0 | |
cisco | secure_firewall_management_center | 7.0.0.1 | |
cisco | secure_firewall_management_center | 7.0.1 | |
cisco | secure_firewall_management_center | 7.0.1.1 | |
cisco | secure_firewall_management_center | 7.0.2 | |
cisco | secure_firewall_management_center | 7.0.2.1 | |
cisco | secure_firewall_management_center | 7.0.3 | |
cisco | secure_firewall_management_center | 7.0.4 | |
cisco | secure_firewall_management_center | 7.1.0 | |
cisco | secure_firewall_management_center | 7.1.0.1 | |
cisco | secure_firewall_management_center | 7.1.0.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "978284EE-8BE8-43ED-ADA0-B90151D83EA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA140F9-4706-4B05-826E-962A277E625A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "270CA092-1AF1-48D4-8695-E7DB694969C5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DFA94312-376E-4785-888F-3C07612E1DF7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "29E73FBF-2579-4660-AFFA-7F9607004226", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "87FAAFFB-0589-441B-8289-8B8A6E18F705", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "73B92119-793D-4A43-A056-24DB6826E759", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "093A0BC2-037C-463F-AFC5-EF11C2954EAD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "B881B8DF-A96D-4B64-B98A-71F0D3388641", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A58A2DA5-3EE7-408D-AAFA-82330F0325B2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F4C51EE7-866B-410C-B75E-EF260D5062B0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración web del software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el Sistema Operativo subyacente. La vulnerabilidad se debe a una validación insuficiente de los parámetros proporcionados por el usuario para algunas API de endpoint. Un atacante podría aprovechar esta vulnerabilidad enviando información manipulada a una API en el endpoint afectado. Un exploit exitoso podría permitir a un atacante ejecutar comandos arbitrarios en el dispositivo con privilegios bajos del sistema. Para aprovechar esta vulnerabilidad con éxito, un atacante necesitaría credenciales válidas para un usuario con permisos de dispositivo: de forma predeterminada, solo las cuentas de usuario Administradores, Aprobadores de Seguridad y Administradores de Red tienen estos permisos.", }, ], id: "CVE-2022-20925", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-15T21:15:32.323", references: [ { source: "psirt@cisco.com", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-06 17:15
Modified
2024-11-26 16:09
Severity ?
Summary
Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_firewall_management_center | 2.0.3 | |
cisco | secure_firewall_management_center | 2.1.0 | |
cisco | secure_firewall_management_center | 2.1.1 | |
cisco | secure_firewall_management_center | 2.2.0 | |
cisco | secure_firewall_management_center | 2.3.0 | |
cisco | secure_firewall_management_center | 5.0.0 | |
cisco | secure_firewall_management_center | 6.0.0 | |
cisco | secure_firewall_management_center | 6.1.0 | |
cisco | secure_firewall_management_center | 6.2.0 | |
cisco | secure_firewall_management_center | 6.2.3 | |
cisco | secure_firewall_management_center | 6.3.0 | |
cisco | secure_firewall_management_center | 6.4.0 | |
cisco | secure_firewall_management_center | 6.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "7FF8F9FC-9A18-4AC5-A90A-F7103CE562B7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "9ECF16EC-BF5F-4547-A7C4-A91801DE32F6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "4DE78FEC-FB06-4119-80E1-56F3877A9626", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0F22637F-C6C3-4A71-BF8A-0F1054EBED27", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "AEBB8B45-E008-4461-AABD-D8D260CAC3F0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:5.0.0:*:*:*:*:*:*:*", matchCriteriaId: "9FB9CA77-4857-416A-8624-7D88B1DCC84C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "036E4035-E8E2-4964-A6F4-7292E1804E91", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6614ED6C-E77E-4C0D-AA96-0BEE84BE2F94", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", matchCriteriaId: "EEEB9A40-0062-406D-B56D-3163CBBE08D4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6175407A-207E-4844-B150-EA0129C4CBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", matchCriteriaId: "134B9AFF-6FFF-4082-80CB-AD2ACBF832F9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", matchCriteriaId: "52651664-CA65-4812-8226-E104E1BE7864", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", matchCriteriaId: "60881FF9-5ACA-4097-8177-56B3DE192B2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en el Cisco Firepower Management Center (FMC) Software y Cisco Firepower User Agent Software, podrían permitir a un atacante acceder a una parte confidencial de un sistema afectado con una cuenta muy privilegiada. Para más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso.", }, ], id: "CVE-2020-3318", lastModified: "2024-11-26T16:09:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-06T17:15:13.887", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }