CVE-2021-34762Path Traversal: '/dir/../filename' in Cisco Firepower Threat Defense

Severity
8.1HIGHNVD
EPSS
0.2%
top 58.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 27
Latest updateMay 24

Description

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal char

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages4 packages

🔴Vulnerability Details

2
GHSA
GHSA-8m4x-wmgm-h3w9: A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacke2022-05-24
CVEList
Cisco Firepower Management Center Software Authenticated Directory Traversal Vulnerability2021-10-27

📋Vendor Advisories

1
Cisco
Cisco Firepower Management Center Software Authenticated Directory Traversal Vulnerability2021-10-27
CVE-2021-34762 — Path Traversal: '/dir/../filename' | cvebase