Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Firepower_management_center_virtual_appliance
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-10-27 | CVE-2021-34755 | Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory. | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 7.8 | ||
2021-10-27 | CVE-2021-34756 | Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory. | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 7.8 | ||
2021-10-27 | CVE-2021-34761 | A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with... | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 6.0 | ||
2021-10-27 | CVE-2021-34762 | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal... | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 8.1 | ||
2021-10-27 | CVE-2021-34763 | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an attacker to execute a cross-site scripting (XSS) attack or an open redirect attack. For more information about these vulnerabilities, see the Details section of this advisory. | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 4.8 | ||
2021-10-27 | CVE-2021-34764 | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an attacker to execute a cross-site scripting (XSS) attack or an open redirect attack. For more information about these vulnerabilities, see the Details section of this advisory. | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 6.1 | ||
2021-10-27 | CVE-2021-34781 | A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could... | Firepower_management_center_virtual_appliance, Firepower_threat_defense, Sourcefire_defense_center | 7.5 | ||
2018-06-21 | CVE-2018-0365 | A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful... | Amp_7150_firmware, Amp_8150_firmware, Firepower_appliance_7010_firmware, Firepower_appliance_7020_firmware, Firepower_appliance_7030_firmware, Firepower_appliance_7050_firmware, Firepower_appliance_7110_firmware, Firepower_appliance_7115_firmware, Firepower_appliance_7120_firmware, Firepower_appliance_7125_firmware, Firepower_appliance_8120_firmware, Firepower_appliance_8130_firmware, Firepower_appliance_8140_firmware, Firepower_appliance_8250_firmware, Firepower_appliance_8260_firmware, Firepower_appliance_8270_firmware, Firepower_appliance_8290_firmware, Firepower_appliance_8350_firmware, Firepower_appliance_8360_firmware, Firepower_appliance_8370_firmware, Firepower_appliance_8390_firmware, Firepower_management_center, Firepower_management_center_1000_firmware, Firepower_management_center_2000_firmware, Firepower_management_center_2500_firmware, Firepower_management_center_4000_firmware, Firepower_management_center_4500_firmware, Firepower_management_center_virtual_appliance, Firesight_management_center_1500_firmware, Firesight_management_center_3500_firmware, Firesight_management_center_750_firmware, Ngips_virtual_appliance | 8.8 |