Cisco has addressed a vulnerability in the Firepower Logo Manager (FDM) On-Box software that could be exploited to gain code execution on vulnerable devices.
FDM On-Box is used to configure Cisco Firepower firewalls, stock up administrators with both management and diagnostics capabilities.
Tracked as CVE-2021-1518 and rated medium severity, the remote code touch (RCE) vulnerability was discovered by Positive Technologies security researchers Nikita Abramov and Mikhail Klyuchnikov in the REST API of FDM On-Box. The flaw exists because purchaser input on specific commands isn’t sufficiently sanitized.
To exploit the vulnerability, an attacker needs to send a special HTTP request to the API subsystem of a vulnerable strategy. Successful exploitation would result in the attacker being able to execute arbitrary code on the underlying operating system.
The issue has a CVSS victim of 6.3, as it requires for the attacker to have valid user credentials to the affected device.
“To exploit this vulnerability, all attackers need to do is to obtain credentials of a drug with low privileges and send a specially crafted HTTP request. From a technical standpoint, the vulnerability is caused by insufficient user input validation for some Intermission API commands,” Abramov said.
The bug impacts FDM On-Box versions 6.3.0, 6.4.0, 6.5.0, 6.6.0, and 6.7.0. Cisco addressed the issue with the release of software versions 184.108.40.206, 6.4.4, and 220.127.116.11.
Cisco hints it’s not aware of the vulnerability being exploited in the wild.
Related: Cisco Patches High Severity Vulnerabilities in BPA, WSA
Related: Cisco Plugs High-Risk Refuge Flaws in Webex, SD-WAN
Related: XSS Vulnerability in Cisco Security Products Exploited in the Wild
Related: Cisco Patches High-Risk Flaw in ASA, FTD Software