Impact
The flaw resides in the REST API of Cisco Secure Firewall Management Center. It results from inadequate validation of user‑supplied input, allowing an attacker to inject arbitrary SQL via crafted API requests. A successful exploit grants read access to the FMC database and the ability to read selected files on the underlying operating system, exposing sensitive data and configuration information.
Affected Systems
Cisco Secure Firewall Management Center. No specific version information is listed in the advisory, so all FMC installations that expose the REST API are potentially vulnerable.
Risk and Exploitability
The CVSS base score of 4.9 indicates low to moderate severity. The EPSS score is below 1% and the vulnerability is not in the CISA KEV catalog, implying a low likelihood of exploitation. Attack vector is inferred from the REST API description; an authenticated attacker can send crafted HTTPS requests within the internal network or through exposed API endpoints. The attacker must hold certain privileged roles—Administrator, Security approver, Intrusion admin, Access admin, or Network admin—making the threat confined to internal users or compromised credentials.
OpenCVE Enrichment