8.1
CVSSv3

CVE-2021-34762

Published: 27/10/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote malicious user to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the malicious user to read or write arbitrary files on the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firepower management center virtual appliance 6.2.3

cisco sourcefire defense center 6.4.0

cisco sourcefire defense center 6.5.0

cisco firepower threat defense

cisco sourcefire defense center 6.2.3

cisco firepower management center virtual appliance 7.1.0

cisco sourcefire defense center 6.6.1

cisco sourcefire defense center 7.0.0

cisco firepower management center virtual appliance 6.4.0

cisco firepower management center virtual appliance 6.5.0

cisco firepower management center virtual appliance 6.6.1

cisco firepower management center virtual appliance 6.7.0

cisco firepower management center virtual appliance 7.0.0

cisco firepower management center virtual appliance 6.6.2

cisco firepower management center virtual appliance 6.6.3

cisco firepower management center virtual appliance 6.6.4

cisco sourcefire defense center 6.6.2

cisco sourcefire defense center 6.6.3

cisco sourcefire defense center 6.6.4

Vendor Advisories

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device The attacker would require valid device credentials The vulnerability is due to insufficient input validation of the HTTPS URL by the ...