First published: Wed Oct 02 2019(Updated: )
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.