A vulnerability in the FTP Representational State Transfer Application Programming Interface (REST API) for Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass FTP malware detection rules and download malware over an FTP connection.
The vulnerability is due to a lack of continuity between the FTP control and data connection when the malware is detected. An attacker could exploit this vulnerability by repeatedly attempting to download FTP malware. An exploit could allow the attacker to bypass the configured FTP malware blocking rules.
There are no workarounds that address this vulnerability.
This advisory is available at the following link: