Product:

Firepower_4110_firmware

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2022-08-25 CVE-2022-20865 A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the... Firepower_4110_firmware, Firepower_4112_firmware, Firepower_4115_firmware, Firepower_4120_firmware, Firepower_4125_firmware, Firepower_4140_firmware, Firepower_4145_firmware, Firepower_4150_firmware, Firepower_9300_sm\-40_firmware, Firepower_9300_sm\-48_firmware, Firepower_9300_sm\-56_firmware, Firepower_9300_sm\-56_x_3_firmware 6.7
2019-10-02 CVE-2019-12675 Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the... Firepower_4110_firmware, Firepower_4115_firmware, Firepower_4120_firmware, Firepower_4125_firmware, Firepower_4140_firmware, Firepower_4145_firmware, Firepower_4150_firmware, Firepower_9300_firmware, Firepower_threat_defense N/A
2019-10-02 CVE-2019-12674 Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the... Firepower_4110_firmware, Firepower_4115_firmware, Firepower_4120_firmware, Firepower_4125_firmware, Firepower_4140_firmware, Firepower_4145_firmware, Firepower_4150_firmware, Firepower_9300_firmware, Firepower_threat_defense N/A