We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the cluster backup feature of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. This vulnerability is due to insufficient validation of user data that is supplied through the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary operating system commands on the affected device. To exploit this vulnerability, an attacker would need valid credentials for a user account with at least the role of Network Administrator. In addition, the attacker would need to persuade a legitimate user to initiate a cluster backup on the affected device.
Reserved 2023-11-08 | Published 2024-10-23 | Updated 2024-10-26 | Assigner ciscoImproper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
sec.cloudapps.cisco.com/...ory/cisco-sa-fmc-cmd-inj-g8AOKnDP (cisco-sa-fmc-cmd-inj-g8AOKnDP)
sec.cloudapps.cisco.com/...dvisory/cisco-sa-fmc-xss-M446vbEO
sec.cloudapps.cisco.com/...enter/viewErp.x?alertId=ERP-75300 (Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication)
Support options