First published: Thu Nov 10 2022(Updated: )
A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center | =6.7.0 | |
Cisco Firepower Management Center | =6.7.0.1 | |
Cisco Firepower Management Center | =6.7.0.2 | |
Cisco Firepower Management Center | =6.7.0.3 | |
Cisco Firepower Management Center | =7.0.0 | |
Cisco Firepower Management Center | =7.0.0.1 | |
Cisco Firepower Management Center | =7.0.1 | |
Cisco Firepower Management Center | =7.0.1.1 | |
Cisco Firepower Management Center | =7.0.2 | |
Cisco Firepower Management Center | =7.0.2.1 | |
Cisco Firepower Management Center | =7.0.3 | |
Cisco Firepower Management Center | =7.0.4 | |
Cisco Firepower Management Center | =7.1.0 | |
Cisco Firepower Management Center | =7.1.0.1 | |
Cisco Firepower Management Center | =7.1.0.2 | |
Cisco Secure Firewall Management Center | =6.7.0 | |
Cisco Secure Firewall Management Center | =6.7.0.1 | |
Cisco Secure Firewall Management Center | =6.7.0.2 | |
Cisco Secure Firewall Management Center | =6.7.0.3 | |
Cisco Secure Firewall Management Center | =7.0.0 | |
Cisco Secure Firewall Management Center | =7.0.0.1 | |
Cisco Secure Firewall Management Center | =7.0.1 | |
Cisco Secure Firewall Management Center | =7.0.1.1 | |
Cisco Secure Firewall Management Center | =7.0.2 | |
Cisco Secure Firewall Management Center | =7.0.2.1 | |
Cisco Secure Firewall Management Center | =7.0.3 | |
Cisco Secure Firewall Management Center | =7.0.4 | |
Cisco Secure Firewall Management Center | =7.1.0 | |
Cisco Secure Firewall Management Center | =7.1.0.1 | |
Cisco Secure Firewall Management Center | =7.1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20925 is a vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software that allows an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
CVE-2022-20925 has a severity rating of 7.2, which is considered high.
CVE-2022-20925 affects Cisco Firepower Management Center versions 6.7.0 to 7.1.0.2.
An attacker can exploit CVE-2022-20925 by sending specially crafted requests to the affected web management interface of the Cisco Firepower Management Center.
Yes, Cisco has released software updates that address the vulnerability. It is recommended to update to the latest version available for your Cisco Firepower Management Center.