Impact
This vulnerability occurs in the web‑based interface of Cisco Secure FMC Software and allows an authenticated remote attacker to inject arbitrary SQL statements due to insufficient input validation. Successful exploitation grants the attacker total access to the FMC database and the capability to read certain files on the underlying operating system, thereby compromising data confidentiality and potentially allowing further system manipulation.
Affected Systems
Cisco Secure Firewall Management Center (FMC) is affected; the specific product version is not listed in the advisory, but any installed instance of the SOC should be considered at risk.
Risk and Exploitability
The flaw carries a CVSS score of 8.1, indicating a severe risk. The EPSS score is less than 1%, suggesting a low current exploitation probability, and the vulnerability is not yet listed in CISA’s KEV catalog. The attack vector is remote and requires that the attacker possess valid user credentials to the FMC web interface, which typically means access to an administrative or privileged account. Once authenticated, the attacker can send crafted requests that execute arbitrary SQL commands, potentially yielding full database compromise and OS file reads.
OpenCVE Enrichment