A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dir-traversal-95UyW5tk | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-10-27 12:15
Updated : 2021-11-03 12:55
NVD link : CVE-2021-34762
Mitre link : CVE-2021-34762
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
cisco
- sourcefire_defense_center
- firepower_threat_defense
- firepower_management_center_virtual_appliance