A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-10-27T18:55:36.199997Z

Updated: 2024-11-07T21:44:23.088Z

Reserved: 2021-06-15T00:00:00

Link: CVE-2021-34762

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:48.207Z

cve-icon NVD

Status : Modified

Published: 2021-10-27T19:15:08.060

Modified: 2024-11-21T06:11:08.593

Link: CVE-2021-34762

cve-icon Redhat

No data.