First published: Wed Oct 02 2019(Updated: )
Multiple vulnerabilities in the Cisco Firepower System Software Detection Engine could allow an unauthenticated, remote attacker to bypass configured Malware and File Policies for RTF and RAR file types. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-firepwr-bypass
Credit: Yaser Mansour.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | >=Earlier than 6.1.0=6.1.0=6.2.0=6.2.1=6.2.2<=6.2.3<6.2.3.15 | 6.2.3.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191002-firepwr-bypass is critical due to the potential for an unauthenticated remote attacker to bypass security policies.
To fix cisco-sa-20191002-firepwr-bypass, upgrade to Cisco FTD Software version 6.2.3.15 or later.
cisco-sa-20191002-firepwr-bypass affects vulnerabilities in malware and file policies specifically for RTF and RAR file types.
Users of Cisco FTD Software versions earlier than 6.1.0, 6.1.0, 6.2.0, 6.2.1, 6.2.2, or up to 6.2.3 are affected by cisco-sa-20191002-firepwr-bypass.
Yes, cisco-sa-20191002-firepwr-bypass can potentially allow data breaches as it enables attackers to bypass security measures.