First published: Wed May 06 2020(Updated: )
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA FMC AI Z5D QOb VN is classified as critical due to the potential for remote file system overwriting.
To fix Cisco SA FMC AI Z5D QOb VN, you should apply the latest security patch provided by Cisco for the affected Firepower Management Center software.
An authenticated, remote attacker can exploit Cisco SA FMC AI Z5D QOb VN due to insufficient input validation.
The affected devices for Cisco SA FMC AI Z5D QOb VN include those running Cisco Firepower Management Center and Firepower Threat Defense software.
The cause of the vulnerability in Cisco SA FMC AI Z5D QOb VN is insufficient input validation in the web UI of the Cisco Firepower Management Center.