A vulnerability in the cluster backup feature of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
This vulnerability is due to insufficient validation of user data that is supplied through the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary operating system commands on the affected device. To exploit this vulnerability, an attacker would need valid credentials for a user account with at least the role of Network Administrator. In addition, the attacker would need to persuade a legitimate user to initiate a cluster backup on the affected device.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco secure Firewall Management Center Software |
|
CPEs | cpe:2.3:a:cisco:secure_firewall_management_center_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco secure Firewall Management Center Software |
|
Metrics |
ssvc
|
Wed, 23 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the cluster backup feature of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. This vulnerability is due to insufficient validation of user data that is supplied through the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary operating system commands on the affected device. To exploit this vulnerability, an attacker would need valid credentials for a user account with at least the role of Network Administrator. In addition, the attacker would need to persuade a legitimate user to initiate a cluster backup on the affected device. | |
Title | Cisco Secure Firewall Management Center Software Backup Cluster Command Injection Vulnerability | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-23T17:07:44.671Z
Updated: 2024-10-26T03:55:31.187Z
Reserved: 2023-11-08T15:08:07.625Z
Link: CVE-2024-20275
Vulnrichment
Updated: 2024-10-23T19:49:11.771Z
NVD
Status : Awaiting Analysis
Published: 2024-10-23T17:15:15.237
Modified: 2024-10-25T12:56:36.827
Link: CVE-2024-20275
Redhat
No data.