SB2019100805 - Multiple vulnerabilities in Cisco Firepower Management Center



SB2019100805 - Multiple vulnerabilities in Cisco Firepower Management Center

Published: October 8, 2019

Security Bulletin ID SB2019100805
Severity
High
Patch available
YES
Number of vulnerabilities 13
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 77% Medium 15% Low 8%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 13 secuirty vulnerabilities.


1) SQL injection (CVE-ID: CVE-2019-12679)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


2) SQL injection (CVE-ID: CVE-2019-12680)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


3) SQL injection (CVE-ID: CVE-2019-12681)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


4) SQL injection (CVE-ID: CVE-2019-12682)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


5) SQL injection (CVE-ID: CVE-2019-12683)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


6) SQL injection (CVE-ID: CVE-2019-12684)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


7) SQL injection (CVE-ID: CVE-2019-12685)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


8) SQL injection (CVE-ID: CVE-2019-12686)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

This vulnerability affects the following products:

Cisco FirePOWER Appliance 8260
Cisco FirePOWER Appliance 8360
Cisco FirePOWER Appliance 8120
Cisco Firepower Management Center 2500
Cisco FirePOWER Appliance 7050
Cisco FirePOWER Appliance 8130
Cisco AMP 7150
Cisco FirePOWER Appliance 8140
Cisco AMP 8150
Cisco FirePOWER Appliance 8350
Cisco FirePOWER Appliance 8270
Cisco FirePOWER Appliance 8390
Cisco NGIPS Virtual Appliance
Cisco Firepower Management Center 4500
Cisco FirePOWER Appliance 8250
Cisco FirePOWER Appliance 7120
Cisco FirePOWER Appliance 8370
Cisco FireSIGHT Management Center 750
Cisco FirePOWER Appliance 7010
Cisco FireSIGHT Management Center 1500
Cisco Firepower Management Center 1000
Cisco FirePOWER Appliance 7020
Cisco FirePOWER Appliance 8290
Cisco FireSIGHT Management Center 3500
Cisco FirePOWER Appliance 7125
Cisco Firepower Management Center 4000
Cisco FirePOWER Appliance 7030
Cisco FirePOWER Appliance 7110
Cisco Firepower Management Center 2000
Cisco Firepower Management Center Virtual Appliance
Cisco FirePOWER Appliance 7115

9) Buffer overflow (CVE-ID: CVE-2019-12687)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient input validation in the web UI. A remote authenticated attacker can send a specially crafted input to the web UI, trigger memory corruption and execute arbitrary commands within the affected device.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Buffer overflow (CVE-ID: CVE-2019-12688)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient input validation in the web UI. A remote authenticated attacker can send a specially crafted input to the web UI, trigger memory corruption and execute arbitrary commands within the affected device.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) Path traversal (CVE-ID: CVE-2019-12691)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error by the web-based management interface when processing directory traversal sequences. A remote authenticated attacker can send a specially crafted HTTP request to the web-based management interface, bypass security restrictions and gain access to the underlying filesystem of the affected device.


12) OS Command Injection (CVE-ID: CVE-2019-12690)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of user-supplied input to the web UI. A remote authenticated administrator can submit a specially crafted input in the web UI and execute arbitrary commands on the device with full root privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Input validation error (CVE-ID: CVE-2019-12689)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input in the web-based management interface. A remote authenticated attacker can send malicious commands to the web-based management interface and execute arbitrary code on the underlying operating system of the affected device.


Remediation

Install update from vendor's website.