First published: Wed Oct 21 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-fmc-redirect-NYDuSEQn is classified as high due to the potential for unauthenticated remote attacks.
To fix cisco-sa-fmc-redirect-NYDuSEQn, apply the latest security updates provided by Cisco for Firepower Management Center Software.
cisco-sa-fmc-redirect-NYDuSEQn enables an unauthenticated remote attacker to redirect users to a malicious web page.
cisco-sa-fmc-redirect-NYDuSEQn affects Cisco Firepower Management Center Software across various versions.
No, user interaction is not required for the exploitation of cisco-sa-fmc-redirect-NYDuSEQn, making it particularly dangerous.