Description
A vulnerability in of Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to cause the device to unexpectedly reload, causing a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the CLI prompt. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Problem types
Product status
6.4.0.1
6.4.0.3
6.4.0.2
6.4.0.4
6.4.0.5
6.4.0.6
6.4.0.7
6.4.0.8
6.4.0.9
6.4.0.10
6.4.0.11
6.4.0.12
6.4.0.13
6.4.0.14
6.4.0.15
6.4.0.16
6.4.0.17
6.4.0.18
7.0.0
7.0.0.1
7.0.1
7.0.1.1
7.0.2
7.0.2.1
7.0.3
7.0.4
7.0.5
7.0.6
7.0.6.1
7.0.6.2
7.0.6.3
7.0.7
7.0.8
7.0.8.1
7.1.0
7.1.0.1
7.1.0.2
7.1.0.3
7.2.0
7.2.0.1
7.2.1
7.2.2
7.2.3
7.2.4
7.2.4.1
7.2.5
7.2.5.1
7.2.6
7.2.7
7.2.5.2
7.2.8
7.2.8.1
7.2.9
7.2.10
7.2.10.2
7.3.0
7.3.1
7.3.1.1
7.3.1.2
7.4.0
7.4.1
7.4.1.1
7.4.2
7.4.2.1
7.4.2.2
7.4.2.3
7.4.2.4
7.6.0
7.6.1
7.6.2
7.6.2.1
7.7.0
7.7.10
7.7.10.1
References
sec.cloudapps.cisco.com/...ory/cisco-sa-ftd-cmd-inj-mTzGZexf (cisco-sa-ftd-cmd-inj-mTzGZexf)