First published: Wed Apr 28 2021(Updated: )
A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-cmdinj-TKyQfDcU
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.15<9.15.1.10=9.14<9.14.2.13=9.13<9.13.1.21 | 9.15.1.10 9.14.2.13 9.13.1.21 |
Cisco FTD Software | >=6.5.0<=6.6.0<6.6.42 | 6.6.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
A vulnerability in the upgrade process of Cisco ASA Software and Cisco FTD Software could allow an authenticated, local attacker to inject commands with root privileges on the underlying OS.
The severity of this vulnerability is medium with a CVSS score of 6.7.
The affected versions of Cisco ASA Software are 9.15, 9.14, and 9.13.
The affected version of Cisco FTD Software is 6.5.
To fix the vulnerability, update Cisco ASA Software to version 9.15.1.10, 9.14.2.13, or 9.13.1.21, and update Cisco FTD Software to version 6.6.42.