Логотип exploitDog
bind:CVE-2019-12674
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12674

Количество 3

Количество 3

nvd логотип

CVE-2019-12674

больше 6 лет назад

Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running FTD instances.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-ch29-7xx3-hvcf

больше 3 лет назад

Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running FTD instances.

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2019-03534

больше 6 лет назад

Уязвимость режима мультиоконности микропрограммного обеспечения межсетевого экрана Firepower Threat Defense (FTD), позволяющая нарушителю покинуть контейнер для своего экземпляра FTD и выполнить произвольные команды с привилегиями root

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12674

Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running FTD instances.

CVSS3: 8.2
0%
Низкий
больше 6 лет назад
github логотип
GHSA-ch29-7xx3-hvcf

Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running FTD instances.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03534

Уязвимость режима мультиоконности микропрограммного обеспечения межсетевого экрана Firepower Threat Defense (FTD), позволяющая нарушителю покинуть контейнер для своего экземпляра FTD и выполнить произвольные команды с привилегиями root

CVSS3: 8.2
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу