A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
                
            References
                    Configurations
                    History
                    26 Nov 2024, 16:09
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:* | |
| First Time | Cisco secure Firewall Management Center | |
| CPE | cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:* | 
21 Nov 2024, 04:37
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 7.2 v3 : 6.7 | 
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject - Vendor Advisory | 
Information
                Published : 2019-05-03 16:29
Updated : 2024-11-26 16:09
NVD link : CVE-2019-1699
Mitre link : CVE-2019-1699
CVE.ORG link : CVE-2019-1699
JSON object : View
Products Affected
                cisco
- secure_firewall_management_center
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
