First published: Wed Nov 09 2022(Updated: )
A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information. This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: This vulnerability was found by Sanmith Prakash Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-fmc-xxe-MzPC4bYd is considered to be high due to the potential for sensitive information disclosure.
To fix cisco-sa-fmc-xxe-MzPC4bYd, you should apply the relevant security patches provided by Cisco for Firepower Management Center Software.
The vulnerability cisco-sa-fmc-xxe-MzPC4bYd affects users of Cisco Firepower Management Center Software.
cisco-sa-fmc-xxe-MzPC4bYd enables an authenticated, remote attacker to view sensitive information.
Yes, authentication is required to exploit the vulnerability cisco-sa-fmc-xxe-MzPC4bYd.