A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dir-traversal-95UyW5tk | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-10-27 19:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-34762
Mitre link : CVE-2021-34762
CVE.ORG link : CVE-2021-34762
JSON object : View
Products Affected
cisco
- firepower_threat_defense
- sourcefire_defense_center
- firepower_management_center_virtual_appliance