CVE-2023-20114
01.11.2023, 17:15
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | secure_firewall_management_center | 6.2.3 ≤ 𝑥 ≤ 6.2.3.18 |
cisco | secure_firewall_management_center | 6.4.0 ≤ 𝑥 ≤ 6.4.0.16 |
cisco | secure_firewall_management_center | 6.6.0 ≤ 𝑥 ≤ 6.6.7.1 |
cisco | secure_firewall_management_center | 7.0.0 ≤ 𝑥 ≤ 7.0.5 |
cisco | secure_firewall_management_center | 7.1.0 ≤ 𝑥 ≤ 7.1.0.3 |
cisco | secure_firewall_management_center | 7.2.0 ≤ 𝑥 ≤ 7.2.3.1 |
cisco | secure_firewall_management_center | 7.3.0 ≤ 𝑥 ≤ 7.3.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-73 - External Control of File Name or PathThe software allows user input to control or influence paths or file names that are used in filesystem operations.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.