First published: Wed Oct 27 2021(Updated: )
Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8 This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: CVE-2021-34755: This vulnerability was found by Ilkin Gasimov Cisco during internal security testingCVE-2021-34756 Cisco during internal security testingCVE-2021-34752: These vulnerabilities were found by Brandon Sakai Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | >=6.5.0=6.6.0<=6.7.0<6.7.0.3 (Jan 2022)>=6.2.2 and earlier=6.2.3=6.3.0<=6.4.0<6.4.0.13 (Nov 2021) | 6.7.0.3 (Jan 2022) 6.4.0.13 (Nov 2021) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID is cisco-sa-ftd-cmdinject-FmzsLN8.
The severity rating is 7.8 (High).
The affected software versions include 6.5.0 up to 6.7.0.3 (Jan 2022) and 6.2.2 and earlier, 6.2.3, 6.3.0, and 6.4.0 up to 6.4.0.13 (Nov 2021) of Cisco FTD Software.
An authenticated, local attacker could exploit these vulnerabilities by executing arbitrary commands with root privileges through the CLI of Cisco Firepower Threat Defense Software.
You can find more information about these vulnerabilities in the Details section of the advisory available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8.