Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v33g-rjxr-6hm4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.

EPSS

Процентиль: 10%
0.00034
Низкий

Связанные уязвимости

CVSS3: 6.7
nvd
почти 6 лет назад

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.

CVSS3: 6.7
fstec
почти 6 лет назад

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense, связанная с недостатками контроля доступа, позволяющая нарушителю выполнить произвольный код с правами root

EPSS

Процентиль: 10%
0.00034
Низкий