Cisco Security Advisory - Cisco Firepower Management Center File Upload Security Bypass Vulnerability

Started by Netwörkheäd, May 06, 2022, 12:23:11 AM

Previous topic - Next topic

Netwörkheäd

Cisco Firepower Management Center File Upload Security Bypass Vulnerability

<p>A vulnerability in the web management interface of Cisco&nbsp;Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system.</p>
<p>This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco&nbsp;FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with <em>root</em> privileges.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg" target="_blank" rel="noopener">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg</a></p>
<p>This advisory is part of the April 2022 release of the Cisco&nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see <a href="https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74836">Cisco&nbsp;Event Response: April 2022 Cisco&nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication</a>.</p>

     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2022-20743
Source: Cisco Firepower Management Center File Upload Security Bypass Vulnerability
Let's not argue. Let's network!