First published: Wed May 22 2024(Updated: )
A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file.This vulnerability exists
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-ftd-archive-bypass-z4wQjwcN vulnerability is considered high severity due to its potential impact on security controls.
To fix the cisco-sa-ftd-archive-bypass-z4wQjwcN vulnerability, update your Cisco Firepower Threat Defense Software to the latest version provided by Cisco.
Organizations using Cisco Firepower Threat Defense Software with configured file policies to inspect encrypted archive files are affected by the cisco-sa-ftd-archive-bypass-z4wQjwcN vulnerability.
The cisco-sa-ftd-archive-bypass-z4wQjwcN vulnerability is caused by a flaw in the file policy feature which allows attackers to bypass restrictions on encrypted archive files.
Yes, the cisco-sa-ftd-archive-bypass-z4wQjwcN vulnerability can be exploited by unauthenticated remote attackers.