Impact
A flaw in the Cisco FXOS Software CLI feature allows an authenticated, local administrator to submit crafted command arguments that bypass input validation. This defect can be leveraged to execute arbitrary operating‑system commands with root privileges, effectively granting the attacker full control over the device’s host environment. The vulnerability is limited to devices on which the attacker already holds administrative credentials.
Affected Systems
Cisco Secure Firewall Threat Defense (FTD) Software, including Cisco Secure Firewall ASA Software, is affected. No specific version information was provided in the advisory; all commonly deployed releases should be considered vulnerable until a patch is applied.
Risk and Exploitability
The CVSS base score of 6 indicates medium severity, and the EPSS score of less than 1% shows a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because exploitation requires valid administrative credentials and access to the CLI, the attack vector is local, and an attacker would need to compromise the device’s management plane or otherwise gain user access before the flaw can be abused.
OpenCVE Enrichment