First published: Wed Nov 09 2022(Updated: )
A vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on an affected system. This vulnerability exists because access to HTTPS endpoints is not properly restricted on an affected device. An attacker could exploit this vulnerability by sending specific messages to the affected HTTPS handler. A successful exploit could allow the attacker to perform configuration changes on the affected system, which should be configured and managed only through Cisco Firepower Management Center (FMC) Software. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-privesc-7GqR2th This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-ftd-mgmt-privesc-7GqR2th vulnerability is classified as high due to its potential to allow authenticated attackers to execute configuration commands.
To fix the cisco-sa-ftd-mgmt-privesc-7GqR2th vulnerability, upgrade to the latest version of Cisco Firepower Threat Defense Software where the issue is resolved.
The cisco-sa-ftd-mgmt-privesc-7GqR2th vulnerability affects Cisco Firepower Management Center and Firepower Threat Defense Software installations.
The potential impacts of the cisco-sa-ftd-mgmt-privesc-7GqR2th vulnerability include unauthorized execution of configuration commands by attackers with high privileges.
There are currently no official workarounds available for the cisco-sa-ftd-mgmt-privesc-7GqR2th vulnerability, so updating the software is recommended.