Impact
User input to certain CLI commands is unsanitized, allowing an authenticated local administrator to submit Lua code that the device will execute with root privileges. This class of vulnerability is a form of operating‑system code injection (CWE‑78). The attacker can use this to gain full control of the firewall, modify its configuration or exfiltrate data, effectively compromising confidentiality, integrity and availability of the protected network.
Affected Systems
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are affected. The description does not specify exact firmware or software versions; all releases that contain the identified CLI commands are potentially vulnerable.
Risk and Exploitability
The CVSS score is 6.0, indicating medium severity. EPSS is reported as less than 1 %, so it is unlikely that automated exploit tools will target this weakness. It has not been listed in the CISA KEV catalog. The vulnerability requires local administrative credentials; an attacker who already achieves authentication can exploit the flaw. Given the medium CVSS and low exploitation probability, the overall risk is moderate, but the ability to gain root access makes it a high value target for privileged insiders or attackers who initially compromise credentials.
OpenCVE Enrichment