First published: Fri Apr 07 2017(Updated: )
A vulnerability in the CLI of the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to perform a command injection attack. More Information: CSCvb61351 CSCvb61637. Known Affected Releases: 2.0(1.68) 3.1(1k)A. Known Fixed Releases: 92.2(1.101) 92.1(1.1645) 2.0(1.82) 1.1(4.136.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Extensible Operating System | =2.0\(1.68\) | |
Cisco Unified Computing System software | =3.1\(1k\)a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6600 is classified as a high severity vulnerability due to its potential for command injection by an authenticated attacker.
To mitigate CVE-2017-6600, apply the latest security patches provided by Cisco for the affected software versions.
CVE-2017-6600 affects the Cisco Unified Computing System Manager and Cisco Firepower 4100 and 9300 Series appliances.
Organizations utilizing vulnerable versions of Cisco UCS Manager or Firepower appliances may be impacted by CVE-2017-6600.
No, CVE-2017-6600 requires local authentication for the command injection attack to be executed.