Impact
A flaw in the web interface of Cisco Secure Firewall Management Center creates an improper system process at boot time, enabling an attacker to send crafted HTTP requests that bypass authentication and execute scripts with root privileges. This vulnerability is a CWE‑288 improper authorization flaw, permitting an unauthenticated user to gain full control over the firewall device.
Affected Systems
The affected product is Cisco Secure Firewall Management Center (FMC) software. Specific affected versions are not disclosed in the advisory and should be verified against Cisco’s Security Advisory for the latest revision.
Risk and Exploitability
With a CVSS score of 10 and an EPSS score of 12%, the vulnerability poses a high risk of exploitation in environments where the FMC web interface is exposed to untrusted networks. It is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is remote via crafted HTTP requests to the FMC management interface, requiring unauthenticated access and no additional privileges.
OpenCVE Enrichment