Lucene search

K
ciscoCiscoCISCO-SA-20151123-FIRE
HistoryNov 23, 2015 - 12:00 a.m.

Cisco Firepower 9000 Operating System Command Injection Vulnerability

2015-11-2300:00:00
tools.cisco.com
13

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.4%

A vulnerability in a user script supplied with Cisco Firepower 9000 could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. The script can be accessed via the web interface.

The vulnerability is due to lack of input validation of the parameters passed to the user script. An attacker could exploit this vulnerability by authenticating to the device and crafting user input to specific script files to inject arbitrary commands. These commands are at the privilege level of the authenticated user.

Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-fire[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-fire”]

Affected configurations

Vulners
Node
ciscofirepower_extensible_operating_systemMatchany
OR
ciscofirepower_extensible_operating_systemMatchany

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.4%

Related for CISCO-SA-20151123-FIRE