First published: Wed May 02 2018(Updated: )
A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =6.1.0 | |
Cisco Secure Firewall Management Center | =6.2.0 | |
Cisco Secure Firewall Management Center | =6.2.1 | |
Cisco Secure Firewall Management Center | =6.2.2 | |
Cisco Secure Firewall Management Center | =6.2.3 | |
Cisco Firepower Management Center Software | =6.1.0 | |
Cisco Firepower Management Center Software | =6.2.0 | |
Cisco Firepower Management Center Software | =6.2.1 | |
Cisco Firepower Management Center Software | =6.2.2 | |
Cisco Firepower Management Center Software | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0278 has been rated as critical due to the potential for unauthenticated remote access to sensitive data.
To address CVE-2018-0278, apply the latest patches provided by Cisco for the affected versions of their software.
CVE-2018-0278 affects Cisco Secure Firewall Management Center versions 6.1.0 to 6.2.3 and Cisco Firepower Management Center versions 6.1.0 to 6.2.3.
CVE-2018-0278 is a cross-origin resource sharing vulnerability in the management console of Cisco Firepower System Software.
Yes, CVE-2018-0278 can be exploited by an unauthenticated, remote attacker to access system-sensitive information.