CWE
91 20
Advisory Published

cisco-sa-ftd-xmlinj-8GWjGzKe: Cisco Firepower Threat Defense Software XML Injection Vulnerability

First published: Wed Apr 27 2022(Updated: )

A vulnerability in CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject XML into the command parser. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted input in commands. A successful exploit could allow the attacker to inject XML into the command parser, which could result in unexpected processing of the command and unexpected command output. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-xmlinj-8GWjGzKe This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.

Affected SoftwareAffected VersionHow to fix
Cisco FTD Software>=6.5.0=6.6.0=6.7.0<=7.0.0<7.0.2 (May 2022)>=6.2.2 and earlier=6.3.0<=6.4.0<6.4.0.15
7.0.2 (May 2022)
6.4.0.15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the vulnerability ID for this Cisco Firepower Threat Defense software vulnerability?

    The vulnerability ID for this Cisco Firepower Threat Defense software vulnerability is cisco-sa-ftd-xmlinj-8GWjGzKe.

  • What is the severity rating of the Cisco Firepower Threat Defense software XML injection vulnerability?

    The severity rating of the Cisco Firepower Threat Defense software XML injection vulnerability is medium.

  • How does the XML injection vulnerability in the Cisco Firepower Threat Defense software occur?

    The XML injection vulnerability in the Cisco Firepower Threat Defense software occurs due to insufficient input validation, allowing an authenticated, local attacker to inject XML into the command parser.

  • Which versions of the Cisco Firepower Threat Defense software are affected by this vulnerability?

    The following versions of the Cisco Firepower Threat Defense software are affected: 6.2.2 and earlier, 6.3.0, 6.4.0 up to 6.4.0.15, 6.5.0, 6.6.0, 6.7.0, and 7.0.0 up to 7.0.2 (May 2022).

  • How can I fix the Cisco Firepower Threat Defense software XML injection vulnerability?

    To fix the Cisco Firepower Threat Defense software XML injection vulnerability, it is recommended to upgrade to a version that includes the necessary security fixes, such as 7.0.2 (May 2022) or 6.4.0.15.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203