cisco firepower_management_center_virtual_appliance 输入验证不恰当
CVE编号
CVE-2021-34761利用情况
暂无补丁情况
N/A披露时间
2021-10-28漏洞描述
A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 6.2.3 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 6.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 6.6.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 6.7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 7.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_management_center_virtual_appliance | 7.1.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.4.0 | Up to (excluding) 6.4.0.13 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.6.0 | Up to (excluding) 6.6.5 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.7.0 | Up to (excluding) 6.7.0.3 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 7.0.0 | Up to (excluding) 7.0.1 | ||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 6.2.3 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 6.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 6.6.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 6.7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 7.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | sourcefire_defense_center | 7.1.0 | - |
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 高
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-20 | 输入验证不恰当 |
CWE-668 | 将资源暴露给错误范围 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论