First published: Wed Apr 27 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: Maxim Suslov.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FMC Software | >=6.2.2 and earlier=6.2.3=6.3=6.4=6.5=6.6=6.7<=7.0<7.0.2 (May 2022) | 7.0.2 (May 2022) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.