A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dir-traversal-95UyW5tk | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-10-27T00:00:00
Updated: 2021-10-27T18:55:36
Reserved: 2021-06-15T00:00:00
Link: CVE-2021-34762
JSON object: View
NVD Information
Status : Modified
Published: 2021-10-27T19:15:08.060
Modified: 2023-11-07T03:36:20.033
Link: CVE-2021-34762
JSON object: View
Redhat Information
No data.