First published: Thu Apr 29 2021(Updated: )
A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center | <6.4.0.12 | |
Cisco Firepower Management Center | >=6.5.0<6.6.3 | |
Cisco Firepower Management Center | >=6.7.0<6.7.0.2 | |
Cisco Secure Firewall Management Center | <6.4.0.12 | |
Cisco Secure Firewall Management Center | >=6.5.0<6.6.3 | |
Cisco Secure Firewall Management Center | >=6.7.0<6.7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1477.
The severity of CVE-2021-1477 is medium with a CVSS score of 4.3.
CVE-2021-1477 affects Cisco Firepower Management Center versions 6.4.0.12 to 6.7.0.2.
CVE-2021-1477 allows an authenticated, remote attacker to access services beyond their authorization.
Yes, Cisco has released a software update to address this vulnerability. Please refer to the Cisco Security Advisory for more information.