A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco secure Firewall Management Center
|
|
CPEs | cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco firepower Management Center
|
Cisco secure Firewall Management Center
|
Thu, 21 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2019-10-02T19:06:45.927718Z
Updated: 2024-11-21T19:12:30.937Z
Reserved: 2019-06-04T00:00:00
Link: CVE-2019-12691
Vulnrichment
Updated: 2024-08-04T23:24:39.247Z
NVD
Status : Modified
Published: 2019-10-02T19:15:13.263
Modified: 2024-11-26T16:09:02.407
Link: CVE-2019-12691
Redhat
No data.