First published: Wed May 22 2024(Updated: )
A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center Software | ||
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20361 has been assigned a high severity rating due to its potential to allow unauthenticated remote access control bypass.
To fix CVE-2024-20361, upgrade to the latest version of Cisco Firepower Management Center and Firepower Threat Defense Software as recommended by Cisco.
CVE-2024-20361 affects Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software.
Yes, CVE-2024-20361 can be exploited by an unauthenticated remote attacker.
CVE-2024-20361 allows attackers to bypass access controls, significantly compromising the security of managed devices.