First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | <6.2.2.2 | |
Cisco Firepower Management Center Software | <6.2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12689 has a high severity rating due to its potential for arbitrary code execution on vulnerable Cisco devices.
To mitigate CVE-2019-12689, upgrade the Cisco Firepower Management Center Software to version 6.2.2.2 or later.
CVE-2019-12689 affects Cisco Secure Firewall Management Center versions prior to 6.2.2.2.
An authenticated remote attacker can exploit CVE-2019-12689 to execute arbitrary code on the affected system.
CVE-2019-12689 is classified as a remote code execution vulnerability in the web-based management interface of the affected Cisco software.