CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.2%
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root.
This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | firepower_threat_defense | * | cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.2.1 | cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.0 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.0.1 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.1 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.3 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.4 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.5 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.5.1 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 6.6.5.2 | cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:* |