First published: Wed Oct 21 2020(Updated: )
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access hidden commands. The vulnerability is due to the presence of undocumented configuration commands. An attacker could exploit this vulnerability by performing specific steps that make the hidden commands accessible. A successful exploit could allow the attacker to make configuration changes to various sections of an affected device that should not be exposed to CLI access. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-hidcmd-pFDeWVBd
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | >=Earlier than release 6.2.2=6.2.2=6.2.3=6.3.0<=6.4.0<6.4.0.10 | 6.4.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-ftd-hidcmd-pFDeWVBd.
The severity rating of this vulnerability is medium (5.3).
Versions earlier than 6.2.2, 6.2.2, 6.2.3, 6.3.0, up to and including 6.4.0 (excluding 6.4.0.10) are affected.
An attacker can exploit this vulnerability by performing specific steps to access hidden commands.
Yes, authentication is required for an attacker to exploit this vulnerability.