First published: Fri Sep 04 2020(Updated: )
A vulnerability in Cisco FXOS Software could allow an authenticated, local attacker with administrative credentials to cause a buffer overflow condition. The vulnerability is due to incorrect bounds checking of values that are parsed from a specific file. An attacker could exploit this vulnerability by supplying a crafted file that, when it is processed, may cause a stack-based buffer overflow. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system with root privileges. An attacker would need to have valid administrative credentials to exploit this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Extensible Operating System | <=2.3.1.58 | |
Cisco Firepower 4110 | ||
Cisco Firepower 4112 | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 | ||
Cisco Firepower 4125 | ||
Cisco Firepower 4140 | ||
Cisco Firepower 4145 | ||
Cisco Firepower 4150 | ||
Cisco Firepower 9300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3545 is a vulnerability in Cisco FXOS Software that could allow an authenticated local attacker with administrative credentials to cause a buffer overflow condition.
The severity of CVE-2020-3545 is high with a CVSS score of 6.7.
Cisco Firepower Extensible Operating System version up to and including 2.3.1.58 is affected by CVE-2020-3545.
An attacker with administrative credentials can exploit CVE-2020-3545 by triggering a buffer overflow through incorrect bounds checking of values parsed from a specific file.
Cisco has released a security advisory with mitigations for CVE-2020-3545. Please refer to the reference link for more details.