First published: Wed Oct 23 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center Software | =7.4.0 | |
Cisco Firepower Management Center Software | =7.4.1 | |
Cisco Firepower Management Center Software | =7.4.1.1 | |
Cisco Secure Firewall Management Center | =7.3.0 | |
Cisco Secure Firewall Management Center | =7.3.1 | |
Cisco Secure Firewall Management Center | =7.3.1.1 | |
Cisco Secure Firewall Management Center | =7.3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20379 has a medium severity rating that allows authenticated, remote attackers to read arbitrary files.
CVE-2024-20379 affects Cisco Firepower Management Center Software versions 7.4.0, 7.4.1, 7.4.1.1 and Cisco Secure Firewall Management Center versions 7.3.0, 7.3.1, 7.3.1.1, and 7.3.1.2.
To fix CVE-2024-20379, upgrade the affected Cisco Secure Firewall Management Center Software to the latest patched version.
Yes, CVE-2024-20379 can be exploited by remote authenticated attackers.
CVE-2024-20379 allows attackers to read arbitrary files from the underlying operating system.