First published: Thu Jul 22 2021(Updated: )
A vulnerability in the REST API of Cisco Firepower Device Manager (FDM) On-Box Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. This vulnerability is due to insufficient sanitization of user input on specific REST API commands. An attacker could exploit this vulnerability by sending a crafted HTTP request to the API subsystem of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system. To exploit this vulnerability, an attacker would need valid low-privileged user credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Device Manager | >=6.3.0<6.4.0 | |
Cisco Firepower Device Manager | >=6.5.0<6.7.0.2 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-rce-Rx6vVurq
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1518 is classified as a critical severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2021-1518, upgrade to the latest version of Cisco Firepower Device Manager, specifically above version 6.7.0.2 or 6.4.0.
CVE-2021-1518 allows authenticated remote attackers to execute arbitrary code, compromising the underlying operating system of the affected device.
CVE-2021-1518 affects Cisco Firepower Device Manager versions between 6.3.0 and 6.4.0, as well as 6.5.0 to 6.7.0.2.
CVE-2021-1518 can be exploited by authenticated remote attackers with access to the REST API of the affected Cisco Firepower Device Manager.