First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user of the underlying operating system. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input in the web UI. A successful exploit could allow an attacker to execute arbitrary commands on the device with full root privileges.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | <6.3.0.5 | |
Cisco Secure Firewall Management Center | >=6.4.0<6.4.0.4 | |
Cisco Firepower Management Center Software | <6.3.0.5 | |
Cisco Firepower Management Center Software | >=6.4.0<6.4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12690 is rated as critical due to the potential for remote authenticated attackers to execute arbitrary commands as the root user.
To mitigate CVE-2019-12690, upgrade your Cisco Secure Firewall Management Center or Cisco Firepower Management Center to the latest version that addresses this vulnerability.
CVE-2019-12690 affects versions of Cisco Secure Firewall Management Center and Cisco Firepower Management Center up to version 6.3.0.5 and between 6.4.0 and 6.4.0.4.
CVE-2019-12690 can be exploited by an authenticated, remote attacker with access to the web UI of the affected systems.
Exploitation of CVE-2019-12690 could lead to unauthorized command execution with root privileges, compromising the security of the affected system.