Логотип exploitDog
bind:CVE-2021-1488
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1488

Количество 3

Количество 3

nvd логотип

CVE-2021-1488

почти 5 лет назад

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-wj4x-hm5q-r6w4

больше 3 лет назад

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2021-02380

почти 5 лет назад

Уязвимость процесса обновления микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance Software (ASA) и Cisco Firepower Threat Defense (FTD), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1488

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

CVSS3: 6.7
0%
Низкий
почти 5 лет назад
github логотип
GHSA-wj4x-hm5q-r6w4

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-02380

Уязвимость процесса обновления микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance Software (ASA) и Cisco Firepower Threat Defense (FTD), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.7
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу