First published: Wed Feb 22 2023(Updated: )
A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands.This vulnerability is due to
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower 4100 Series | ||
Cisco Firepower 9300 Security Appliance | ||
Cisco UCS Fabric Interconnects 6200 Series | ||
Cisco UCS Fabric Interconnects 6300 Series | ||
Cisco UCS Fabric Interconnects 6400 Series | ||
Cisco UCS Fabric Interconnects 6500 Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability cisco-sa-nxfp-cmdinj-XXBZjtR is considered high due to its potential for unauthorized command injection by authenticated attackers.
To fix cisco-sa-nxfp-cmdinj-XXBZjtR, update your Cisco Firepower or UCS Fabric Interconnects to the latest version provided by Cisco.
The devices affected by cisco-sa-nxfp-cmdinj-XXBZjtR include Cisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects.
No, the vulnerability cisco-sa-nxfp-cmdinj-XXBZjtR requires local access for exploitation, as it involves command injection through the CLI.
The potential impacts of cisco-sa-nxfp-cmdinj-XXBZjtR include unauthorized access to system commands and possible compromise of the affected devices.