First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =6.2.2 | |
Cisco Firepower Management Center Software | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12688 is rated as a critical vulnerability due to its potential to allow remote command execution.
To fix CVE-2019-12688, upgrade to a patched version of the Cisco Firepower Management Center software as recommended by Cisco.
CVE-2019-12688 affects Cisco Secure Firewall Management Center and Cisco Firepower Management Center, specifically version 6.2.2.
CVE-2019-12688 can be exploited by an authenticated remote attacker with sufficient privileges on the affected device.
CVE-2019-12688 is an input validation vulnerability that can lead to remote code execution.