CVE-2020-3253

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-shell-9rhJF68K - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-shell-9rhJF68K - Vendor Advisory

Information

Published : 2020-05-06 17:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3253

Mitre link : CVE-2020-3253

CVE.ORG link : CVE-2020-3253


JSON object : View

Products Affected

cisco

  • firepower_threat_defense
CWE
CWE-284

Improper Access Control

NVD-CWE-Other