First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =6.2.2 | |
Cisco Secure Firewall Management Center | =6.2.3 | |
Cisco Firepower Management Center Software | =6.2.2 | |
Cisco Firepower Management Center Software | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12687 is classified as a high severity vulnerability.
To fix CVE-2019-12687, update your Cisco Firepower Management Center to the latest version as recommended by Cisco.
CVE-2019-12687 affects users of Cisco Secure Firewall Management Center versions 6.2.2 and 6.2.3, as well as Cisco Firepower Management Center versions 6.2.2 and 6.2.3.
CVE-2019-12687 allows an authenticated, remote attacker to execute arbitrary commands on the affected device.
CVE-2019-12687 is caused by insufficient input validation in the web UI of the Cisco Firepower Management Center.