First published: Tue Nov 05 2019(Updated: )
A vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to insufficient normalization of a text-based payload. An attacker could exploit this vulnerability by sending traffic that contains specifically obfuscated payloads through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious payloads to protected systems that would otherwise be blocked.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center | >=2.9.12<=2.9.12.15 | |
Cisco Firepower Management Center | >=2.9.13<=2.9.13.6 | |
Cisco Firepower Management Center | >=2.9.14.0<=2.9.14.5 | |
Cisco Firepower Management Center | =2.9.15 | |
Cisco Firepower Management Center | =2.9.16 | |
Cisco FirePOWER Services Software for ASA | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1981 is a vulnerability in the normalization functionality of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software.
An unauthenticated, remote attacker can exploit CVE-2019-1981 to bypass filtering protections.
Cisco Firepower Management Center versions 2.9.12 to 2.9.12.15, 2.9.13 to 2.9.13.6, 2.9.14.0 to 2.9.14.5, 2.9.15, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Threat Defense are affected by CVE-2019-1981.
CVE-2019-1981 has a severity rating of medium with a CVSS score of 5.8.
Updating to the latest version of the affected software is recommended to fix CVE-2019-1981.