Cisco Firepower Management Center (FMC) 和 Cisco Firepower Threat Defense (FTD) 安全漏洞
CVE编号
CVE-2020-3550利用情况
暂无补丁情况
N/A披露时间
2020-10-22漏洞描述
Cisco Firepower Management Center(FMC)和Cisco Firepower Threat Defense(FTD)都是美国思科(Cisco)公司的产品。Cisco Firepower Management Center是新一代防火墙管理中心软件。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。 Cisco Firepower Management Center (FMC) 和 Cisco Firepower Threat Defense (FTD) 存在安全漏洞,该漏洞源于输入验证不足。攻击者可利用该漏洞可以通过使用特定sfmgr命令中的相对路径来利用此漏洞。一个漏洞可能允许攻击者可利用该漏洞在sftunner连接的对等设备上读取或写入任意文件。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center | * | Up to (including) 6.0.1 | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center | * | From (including) 6.3.0 | Up to (excluding) 6.3.0.6 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center | * | From (including) 6.4.0 | Up to (excluding) 6.4.0.10 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center | 6.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center | 6.2.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | Up to (including) 6.0.1 | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.3.0 | Up to (excluding) 6.3.0.6 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.4.0 | Up to (excluding) 6.4.0.10 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | 6.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | 6.2.1 | - | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | kernel | * | Up to (excluding) 4.18 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8.2 | kernel | * | Up to (excluding) 4.18.0-193.60.2 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | kernel | * | Up to (excluding) 4.18.0-305.el8 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | privoxy-debuginfo | * | Up to (excluding) 3.0.31-1.el7 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | qemu | * | Up to (excluding) 4.1.0-44.p03.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | qemu | * | Up to (excluding) 4.19.90-25.4.v2101.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | qemu-guest-agent | * | Up to (excluding) 4.2.0-34.8.p05.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | qemu | * | Up to (excluding) 4.1.0-44.p03.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | qemu | * | Up to (excluding) 4.19.90-25.4.v2101.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | qemu-seabios | * | Up to (excluding) 2.37-lp152.4.9.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | qemu-s390 | * | Up to (excluding) 5.2.0-103.2 | |||||
运行在以下环境 | |||||||||
系统 | oracle_6 | kernel | * | Up to (excluding) 4.1.12-124.50.2.el6uek | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | kernel | * | Up to (excluding) 4.1.12-124.50.2.el7uek | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | kernel | * | Up to (excluding) 4.18.0-305.el8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | kernel | * | Up to (excluding) 4.18.0-305.el8 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | binutils-devel | * | Up to (excluding) 3.1.1.1-57.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | linux | * | Up to (excluding) 4.4.0-198.230 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | qemu | * | Up to (excluding) 2021-09-16 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-22 | 对路径名的限制不恰当(路径遍历) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论