First published: Thu Apr 29 2021(Updated: )
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device that is running in multi-instance mode. This vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | >=6.4.0<6.4.0.10 | |
Cisco Firepower Threat Defense | >=6.5.0<6.5.0.5 | |
Cisco Firepower Threat Defense | >=6.6.0<6.6.1 | |
Cisco Firepower 4110 | ||
Cisco Firepower 4112 | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 | ||
Cisco Firepower 4125 | ||
Cisco Firepower 4140 | ||
Cisco Firepower 4145 | ||
Cisco Firepower 4150 | ||
Cisco Firepower 9300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1448 is a vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software that could allow an authenticated, local attacker to execute arbitrary commands with root privileges.
The severity of CVE-2021-1448 is high with a CVSS score of 7.8.
Cisco Firepower Threat Defense Software versions 6.4.0 to 6.4.0.10, 6.5.0 to 6.5.0.5, and 6.6.0 to 6.6.1 are affected by CVE-2021-1448.
An authenticated, local attacker can exploit CVE-2021-1448 by executing arbitrary commands with root privileges on the underlying operating system of an affected device that is running in multi-instance mode.
You can find more information about CVE-2021-1448 on the Cisco Security Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinj-vWY5wqZT