CVE-2022-20729

A vulnerability in CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject XML into the command parser. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted input in commands. A successful exploit could allow the attacker to inject XML into the command parser, which could result in unexpected processing of the command and unexpected command output.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-xmlinj-8GWjGzKe - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-xmlinj-8GWjGzKe - Vendor Advisory
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 4.4

Information

Published : 2022-05-03 04:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20729

Mitre link : CVE-2022-20729

CVE.ORG link : CVE-2022-20729


JSON object : View

Products Affected

cisco

  • firepower_threat_defense
CWE
CWE-91

XML Injection (aka Blind XPath Injection)