A vulnerability in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to bypass security protections and upload malicious files to the affected system. This vulnerability is due to improper validation of files uploaded to the web management interface of Cisco FMC Software. An attacker could exploit this vulnerability by uploading a maliciously crafted file to a device running affected software. A successful exploit could allow the attacker to store malicious files on the device, which they could access later to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    26 Nov 2024, 16:09
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Cisco secure Firewall Management Center | |
| First Time | Cisco secure Firewall Management Center | |
| CPE | cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:* | |
| CPE | cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:* | 
21 Nov 2024, 06:43
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 9.0 v3 : 6.5 | 
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg - Vendor Advisory | 
Information
                Published : 2022-05-03 04:15
Updated : 2024-11-26 16:09
NVD link : CVE-2022-20743
Mitre link : CVE-2022-20743
CVE.ORG link : CVE-2022-20743
JSON object : View
Products Affected
                cisco
- secure_firewall_management_center
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
