First published: Wed May 06 2020(Updated: )
A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense (FTD) | <6.2.2.1 | |
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | =6.2.2 | |
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | =6.2.3 | |
Cisco Secure Firewall Management Center | =6.2.2 | |
Cisco Secure Firewall Management Center | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3308 is rated as a high severity vulnerability due to its potential to allow the installation of malicious software on affected Cisco devices.
To fix CVE-2020-3308, upgrade affected Cisco Firepower Threat Defense and Secure Firewall Management Center Software to the latest version as advised by Cisco.
CVE-2020-3308 affects Cisco Firepower Threat Defense and Secure Firewall Management Center Software versions below 6.2.2.1.
Exploitation of CVE-2020-3308 requires authenticated, remote access with administrator-level credentials to the affected device.
By exploiting CVE-2020-3308, an attacker could install a malicious software patch, potentially compromising the integrity and security of the device.