First published: Wed Oct 23 2024(Updated: )
A vulnerability in the geolocation access control feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass an access control policy.This vulnerability is due to improper assignment of geolocation data. An attacker could exploit
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense (FTD) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-ftd-geoip-bypass-MB4zRDu vulnerability is rated as high severity due to its potential for unauthorized access.
To fix cisco-sa-ftd-geoip-bypass-MB4zRDu, apply the latest patches provided by Cisco for Firepower Threat Defense Software.
The cisco-sa-ftd-geoip-bypass-MB4zRDu vulnerability allows attackers to bypass geolocation-based access controls.
Organizations using Cisco Firepower Threat Defense (FTD) Software are affected by cisco-sa-ftd-geoip-bypass-MB4zRDu.
Exploitation of cisco-sa-ftd-geoip-bypass-MB4zRDu can be performed remotely by unauthenticated attackers.