Impact
A flaw in the web interface of Cisco Secure Firewall Management Center creates an improper system process at boot time, enabling an attacker to send crafted HTTP requests that bypass authentication and execute scripts with root privileges. This vulnerability falls under improper authorization, permitting an unauthenticated user to gain full control over the firewall device.
Affected Systems
The affected product is Cisco Secure Firewall Management Center (FMC) software. Specific affected versions are not disclosed in the advisory and should be verified against Cisco’s Security Advisory for the latest revision.
Risk and Exploitability
With a CVSS score of 10 and an EPSS score of 11%, the vulnerability poses a high risk of exploitation in environments where the FMC web interface is exposed to untrusted networks. It is not yet listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is inferred to be remote via HTTP requests to the FMC management interface, requiring unauthenticated access and no additional privileges.
OpenCVE Enrichment