First published: Wed May 06 2020(Updated: )
A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | <6.3.0 | |
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3311 is rated as a high severity vulnerability.
To fix CVE-2020-3311, upgrade to a version of Cisco Firepower Management Center Software later than 6.3.0.
The impact of CVE-2020-3311 is that it allows unauthenticated remote attackers to redirect users to a malicious web page.
CVE-2020-3311 affects users of Cisco Secure Firewall Management Center and Cisco Firepower Management Center Software versions up to 6.3.0.
CVE-2020-3311 is caused by improper input validation of HTTP request parameters in the web interface of Cisco Firepower Management Center.