First published: Wed May 01 2019(Updated: )
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject
Credit: Lubomir Vesely Tower Street
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =6.2.3<6.2.3.12=6.2.2<6.2.3.12=6.2.1<6.2.3.12=6.2.0<6.2.3.12=6.1.0<6.2.3.12=6.0.1<6.2.3.12=6.0<6.2.3.12 | 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190501-ftd-cmd-inject is classified as high due to the potential impact of command injection by an authenticated attacker.
To remediate cisco-sa-20190501-ftd-cmd-inject, upgrade your Cisco Firepower Threat Defense Software to a version that addresses the vulnerability.
Cisco FTD Software versions 6.2.3 and earlier, including 6.2.2, 6.2.1, 6.2.0, 6.1.0, 6.0.1, and 6.0 are affected by cisco-sa-20190501-ftd-cmd-inject.
No, an unauthenticated attacker cannot exploit cisco-sa-20190501-ftd-cmd-inject as it requires local authenticated access.
The cisco-sa-20190501-ftd-cmd-inject vulnerability allows local attackers to perform command injection attacks that can lead to unauthorized command execution.