First published: Fri May 03 2019(Updated: )
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | <6.2.3.12 | |
Cisco Firepower Management Center Software | <6.2.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1699 has been classified as a medium severity vulnerability.
To address CVE-2019-1699, upgrade your Cisco Firepower Threat Defense Software to a version higher than 6.2.3.12.
CVE-2019-1699 affects users of Cisco Secure Firewall Management Center and Cisco Firepower Management Center Software versions below 6.2.3.12.
An authenticated, local attacker could perform a command injection attack via CVE-2019-1699.
The vulnerability in CVE-2019-1699 is caused by insufficient input validation in the Cisco Firepower Threat Defense CLI.