- Description
- The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D17B44DA-B955-4171-BC60-EDEDD19B5274"
},
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "456DC3D1-4FEE-4C05-8AFD-E28E6E12F4AC"
},
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E80F6ABE-ED3A-4F37-91E7-102DB4B63BC4"
},
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9FC04411-7DDF-4E11-A22C-1013396AC47B"
},
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "27EA38C1-A34F-430A-92F7-1D299F78B449"
}
],
"operator": "OR"
}
]
}
]