December 12, 2023

Cisco has  released an advisory warning of a critical vulnerability in its Firepower Management Center (FMC) Software. The vulnerability, tracked as CVE-2023-20048, with a CVSS score of 9.9, making it one of the most severe security vulnerabilities ever discovered.

The FMC is the brains behind Cisco’s Firepower Threat Defense (FTD), orchestrating security measures and shielding networks from threats. The vulnerability lays bare an oversight in the web services interface of this software, a gateway for the authenticated, yet not necessarily authorized, to commandeer the system.

Advertisements

The vulnerability is a command injection vulnerability in the web services interface of Cisco FMC Software. This means that an attacker could exploit the vulnerability to execute arbitrary commands on the underlying operating system of the FMC device. This could give the attacker complete control over the FMC device and could also allow the attacker to gain access to the FTD devices that are managed by the FMC device.

To exploit the vulnerability, an attacker would need to have valid credentials for the FMC web services interface. Once the attacker has authenticated, they could send a crafted HTTP request to

A successful exploit could allow an attacker to compromise the FMC device and gain access to the FTD devices that are managed by the FMC device. This could allow the attacker to disrupt or disable the FTD devices, or to steal sensitive data that is being processed by the FTD devices.

Advertisements

Cisco has acted with due diligence, fortifying the digital battlements by issuing software updates to patch the exposed vulnerability. The silver lining is that there have been no reports of malevolent use or public announcements of this security flaw.

It is important to update to the latest version as soon as possible. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d