Lucene search

K
ciscoCiscoCISCO-SA-ASA-CMDINJ-TKYQFDCU
HistoryApr 28, 2021 - 4:00 p.m.

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000 and 2100 Series Appliances Command Injection Vulnerability

2021-04-2816:00:00
tools.cisco.com
49

0.0004 Low

EPSS

Percentile

5.2%

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS).

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-cmdinj-TKyQfDcU [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-cmdinj-TKyQfDcU”]

Affected configurations

Vulners
Node
ciscoadaptive_security_virtual_applianceMatch9.14
OR
ciscofirepowerMatchany
OR
ciscofirepower_threat_defense_softwareMatchany
OR
ciscoadaptive_security_virtual_applianceMatch9.14.2.8
OR
ciscofirepower_services_for_adaptive_security_applianceMatch2100_series
OR
ciscofirepower_threat_defense_softwareMatchany
OR
ciscofirepower_services_for_adaptive_security_applianceMatch2100_series

0.0004 Low

EPSS

Percentile

5.2%

Related for CISCO-SA-ASA-CMDINJ-TKYQFDCU