Command injection in Cisco Firepower 9300 Security Appliance and Cisco Firepower 4100 Series Next-Generation Firewall - CVE-2017-12277
Published: November 2, 2017
Vulnerability identifier: #VU9093
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12277
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Firepower 9300 Security Appliance
Cisco Firepower 4100 Series Next-Generation Firewall
Cisco Firepower 9300 Security Appliance
Cisco Firepower 4100 Series Next-Generation Firewall
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to execute arbitrary commands on the target system.
The weakness exists in the Smart Licensing Manager service of the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance due to insufficient input validation of certain Smart Licensing configuration parameters. A remote attacker can configure a malicious URLand execute arbitrary commands with root privileges.
The weakness exists in the Smart Licensing Manager service of the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance due to insufficient input validation of certain Smart Licensing configuration parameters. A remote attacker can configure a malicious URLand execute arbitrary commands with root privileges.
How to mitigate CVE-2017-12277
Install update from vendor's website (1.1.4.175, 2.0.1.135).