First published: Wed Oct 23 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =7.3.0 | |
Cisco Secure Firewall Management Center | =7.3.1 | |
Cisco Secure Firewall Management Center | =7.3.1.1 | |
Cisco Secure Firewall Management Center | =7.3.1.2 | |
Cisco Secure Firewall Management Center | =7.4.0 | |
Cisco Secure Firewall Management Center | =7.4.1 | |
Cisco Secure Firewall Management Center | =7.4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.