Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-10832

Опубликовано: 23 окт. 2024
Источник: fstec
CVSS3: 6.1
CVSS2: 6.4
EPSS Низкий

Описание

Уязвимость веб-интерфейса управления программного обеспечения администрирования сети Cisco Secure Firewall Management Center (ранее Cisco Firepower Management Center) существует из-за непринятия мер по защите структуры веб-страницы. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код путем специально созданного HTML-документа

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Firepower Management Center

Версия ПО

6.2.3.6 (Cisco Firepower Management Center)
6.2.3.1 (Cisco Firepower Management Center)
6.2.3.2 (Cisco Firepower Management Center)
6.4.0.11 (Cisco Firepower Management Center)
6.6.0.1 (Cisco Firepower Management Center)
7.0.0 (Cisco Firepower Management Center)
7.0.0.1 (Cisco Firepower Management Center)
7.0.1 (Cisco Firepower Management Center)
7.0.1.1 (Cisco Firepower Management Center)
7.0.2 (Cisco Firepower Management Center)
7.0.2.1 (Cisco Firepower Management Center)
7.0.3 (Cisco Firepower Management Center)
7.0.4 (Cisco Firepower Management Center)
6.2.3.3 (Cisco Firepower Management Center)
6.2.3.4 (Cisco Firepower Management Center)
6.2.3.5 (Cisco Firepower Management Center)
6.2.3.7 (Cisco Firepower Management Center)
6.2.3.9 (Cisco Firepower Management Center)
6.2.3.10 (Cisco Firepower Management Center)
6.2.3.11 (Cisco Firepower Management Center)
6.2.3.12 (Cisco Firepower Management Center)
6.2.3.13 (Cisco Firepower Management Center)
6.2.3.14 (Cisco Firepower Management Center)
6.2.3.15 (Cisco Firepower Management Center)
6.2.3.16 (Cisco Firepower Management Center)
6.2.3.17 (Cisco Firepower Management Center)
6.2.3.18 (Cisco Firepower Management Center)
6.4.0.1 (Cisco Firepower Management Center)
6.4.0.3 (Cisco Firepower Management Center)
6.4.0.2 (Cisco Firepower Management Center)
6.4.0.4 (Cisco Firepower Management Center)
6.4.0.5 (Cisco Firepower Management Center)
6.4.0.6 (Cisco Firepower Management Center)
6.4.0.7 (Cisco Firepower Management Center)
6.4.0.8 (Cisco Firepower Management Center)
6.4.0.9 (Cisco Firepower Management Center)
6.4.0.10 (Cisco Firepower Management Center)
6.4.0.12 (Cisco Firepower Management Center)
6.4.0.13 (Cisco Firepower Management Center)
6.4.0.14 (Cisco Firepower Management Center)
6.4.0.15 (Cisco Firepower Management Center)
6.4.0.16 (Cisco Firepower Management Center)
6.6.5.1 (Cisco Firepower Management Center)
6.6.5.2 (Cisco Firepower Management Center)
6.6.7.1 (Cisco Firepower Management Center)
6.7.0.1 (Cisco Firepower Management Center)
6.7.0.2 (Cisco Firepower Management Center)
6.7.0.3 (Cisco Firepower Management Center)
7.0.5 (Cisco Firepower Management Center)
7.1.0.1 (Cisco Firepower Management Center)
7.1.0.2 (Cisco Firepower Management Center)
7.1.0.3 (Cisco Firepower Management Center)
7.2.0.1 (Cisco Firepower Management Center)
7.2.3.1 (Cisco Firepower Management Center)
7.3.1.1 (Cisco Firepower Management Center)
7.0.6 (Cisco Firepower Management Center)
7.2.4.1 (Cisco Firepower Management Center)
7.3.1.2 (Cisco Firepower Management Center)
7.4.1.1 (Cisco Firepower Management Center)
7.0.6.1 (Cisco Firepower Management Center)
7.2.5.1 (Cisco Firepower Management Center)
7.2.5.2 (Cisco Firepower Management Center)
6.2.3.8 (Cisco Firepower Management Center)
6.4.0.17 (Cisco Firepower Management Center)
6.4.0.18 (Cisco Firepower Management Center)
6.6.7.2 (Cisco Firepower Management Center)

Тип ПО

ПО программно-аппаратных средств защиты

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,4)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,1)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-nfJeYHxz

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 43%
0.00208
Низкий

6.1 Medium

CVSS3

6.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
nvd
больше 1 года назад

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, access arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To successfully exploit this vulnerability, an attacker would need valid credentials for a user account with policy-editing permissions, such as Network Admin, Intrusion Admin, or any custom user role with the same capabilities.

CVSS3: 5.5
github
больше 1 года назад

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, access arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To successfully exploit this vulnerability, an attacker would need valid credentials for a user account with policy-editing permissions, such as Network Admin, Intrusion Admin, or any custom user role with the same capabilities.

EPSS

Процентиль: 43%
0.00208
Низкий

6.1 Medium

CVSS3

6.4 Medium

CVSS2