First published: Wed May 06 2020(Updated: )
A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | >=Earlier than 6.1.0=6.1.0=6.2.0=6.2.1=6.2.2<=6.2.3<6.2.3.15 | 6.2.3.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-ftd-infodis-kZxGtUJD vulnerability is considered high severity due to its potential for unauthorized read access to sensitive data.
To fix cisco-sa-ftd-infodis-kZxGtUJD, upgrade the Cisco Firepower Threat Defense Software to version 6.2.3.15 or later.
The cisco-sa-ftd-infodis-kZxGtUJD vulnerability affects devices running vulnerable versions of Cisco Firepower Threat Defense Software.
Yes, an unauthenticated remote attacker can exploit the cisco-sa-ftd-infodis-kZxGtUJD vulnerability.
No, authentication is not required to exploit the cisco-sa-ftd-infodis-kZxGtUJD vulnerability.