A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Nov 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco secure Firewall Management Center
|
|
CPEs | cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco secure Firewall Management Center
|
Wed, 23 Oct 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco firepower Management Center |
|
CPEs | cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco firepower Management Center |
|
Metrics |
ssvc
|
Wed, 23 Oct 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges. | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-23T17:51:01.385Z
Updated: 2024-10-23T20:59:03.182Z
Reserved: 2023-11-08T15:08:07.681Z
Link: CVE-2024-20473
Vulnrichment
Updated: 2024-10-23T20:58:53.971Z
NVD
Status : Analyzed
Published: 2024-10-23T18:15:11.280
Modified: 2024-11-01T18:09:35.813
Link: CVE-2024-20473
Redhat
No data.