Use of Hard-coded Password in Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100 and 4200 Series



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-20412
CWE-ID CWE-259
Exploitation vector Local
Public exploit N/A
Vulnerable software
Cisco Firepower Threat Defense (FTD)
Hardware solutions / Security hardware applicances

Firepower 1000 Series Appliances
Hardware solutions / Other hardware appliances

Firepower 3100 Series Appliances
Hardware solutions / Other hardware appliances

Firepower 4200 Series Appliances
Hardware solutions / Other hardware appliances

Firepower 2100 Series Security Appliances
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use of Hard-coded Password

EUVDB-ID: #VU99342

Risk: Low

CVSSv3.1: 8.1 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-20412

CWE-ID: CWE-259 - Use of Hard-coded Password

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the presence of static accounts with hard-coded passwords on an affected system. A local attacker can access the target system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options or render the device unable to boot to the operating system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Firepower Threat Defense (FTD): 7.1.0 - 7.4.1.1

Firepower 1000 Series Appliances: All versions

Firepower 2100 Series Security Appliances: All versions

Firepower 3100 Series Appliances: All versions

Firepower 4200 Series Appliances: All versions

CPE2.3 External links

http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###