A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attacker could exploit this vulnerability by convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the application with an active session cookie. A successful exploit could allow the attacker to retrieve policy or configuration information from the affected software and to perform another attack against the management console. Cisco Bug IDs: CSCvh68311.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104122 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2018-05-02T22:00:00
Updated: 2018-05-10T09:57:01
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0278
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-05-02T22:29:00.967
Modified: 2020-09-04T18:33:00.137
Link: CVE-2018-0278
JSON object: View
Redhat Information
No data.