First published: Wed Oct 02 2019(Updated: )
A vulnerability in the command line interface (CLI) of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker with administrative privileges to execute commands on the underlying operating system with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by executing a specific CLI command that includes crafted arguments. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | <6.3.0.5 | |
Cisco Firepower Threat Defense | >=6.4.0<6.4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12694 has been classified as a critical severity vulnerability due to its potential for remote code execution with root privileges.
To fix CVE-2019-12694, you should update your Cisco Firepower Threat Defense software to the latest version available.
CVE-2019-12694 affects Cisco Firepower Threat Defense software versions prior to 6.3.0.5 and between 6.4.0 and 6.4.0.4.
CVE-2019-12694 allows an authenticated local attacker with administrative privileges to execute arbitrary commands on the system.
Yes, CVE-2019-12694 arises from a vulnerability in the command line interface (CLI) of Cisco Firepower Threat Defense software.