CVE-2016-1457
Published Aug 18, 2016
Last updated 7 years ago
Overview
- Description
- The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.1.2 and 5.4.x before 5.4.0.1 allows remote authenticated users to execute arbitrary commands as root via crafted HTTP requests, aka Bug ID CSCur25513.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_management_center:4.10.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40129F73-08A0-4943-982C-5B74158D07E4" }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0163047-0645-4096-BD3D-ED04F7A390AE" }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:5.3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "682B4681-A905-47EB-A430-2B77CBABC971" }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5320FAC0-17A9-4D76-BAB7-1F01AB5E6839" }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37F94CE2-06F1-4243-867C-E715704017B3" } ], "operator": "OR" } ] } ]