A vulnerability in the file and malware inspection feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass the file and malware inspection policies on an affected system. The vulnerability exists because the affected software insufficiently validates incoming traffic. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to bypass the file and malware inspection policies and send malicious traffic through the affected device.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:* | |
First Time |
Cisco secure Firewall Management Center
|
|
CPE | cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:* |
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass - Vendor Advisory |
Information
Published : 2019-10-02 19:15
Updated : 2024-11-26 16:09
NVD link : CVE-2019-12701
Mitre link : CVE-2019-12701
CVE.ORG link : CVE-2019-12701
JSON object : View
Products Affected
cisco
- secure_firewall_management_center
- vdb_fingerprint_database
CWE
CWE-20
Improper Input Validation