Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities

🚨 SEVERITY: MEDIUM — CVSS 6.5 Security Advisory

TL;DR 📌

Multiple vulnerabilities have been identified in the Cisco Secure Firewall Management Center (FMC) Software that could allow authenticated, low-privileged remote attackers to access unauthorized files. The highest CVSS score for these vulnerabilities is 6.5, indicating a medium level of risk. Software updates are available to address these issues, but there are no workarounds.

What happened 🕵️‍♂️

Cisco has disclosed multiple vulnerabilities in the web-based management interface of the Cisco Secure Firewall Management Center (FMC) Software. These vulnerabilities could allow an authenticated, low-privileged remote attacker to access files they are not authorized to view, including troubleshoot files and generated reports from different domains managed on the same FMC instance. The vulnerabilities stem from missing authorization checks.

Affected products 🖥️

The vulnerabilities affect Cisco Secure FMC Software when configured for multitenancy using domains. Other Cisco products, such as the Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Software, are confirmed not to be vulnerable.

Fixed software 🔧

Upgrade to the first fixed release in your train (or later):

Release / Product First Fixed Release Notes
1.0 Initial public release.

Workarounds 🧯

There are no workarounds available to mitigate these vulnerabilities.

Risk in context 🎯

The highest CVSS score for these vulnerabilities is 6.5, which is categorized as Medium. The vulnerabilities are accessible over the network (internet-facing) and require authentication, but they do not impact availability. Successful exploitation could lead to unauthorized access to sensitive information, which could have serious implications for data privacy and security.

Fast facts ⚡

  • Vulnerabilities: Authorization bypass in Cisco Secure FMC Software
  • CVSS Score: 6.5 (Medium)
  • Exploitation: Requires authenticated access
  • Impact: Unauthorized access to sensitive files
  • Workarounds: None available

For leadership 🧭

The vulnerabilities in Cisco Secure Firewall Management Center Software present a Medium risk to our organization. They are accessible by authenticated users, which could allow for unauthorized access to sensitive files across different domains. Remediation is essential; we recommend patching within 7 days of the release of the fixed software to mitigate risks associated with these vulnerabilities. The operational impact is expected to be minimal, requiring only a brief maintenance window with no anticipated configuration drift.

Now: Review and prioritize patching the affected Cisco Secure FMC Software.
Next: Ensure all relevant personnel are informed about the vulnerabilities and the need for updates.
Later: Monitor for any further advisories or updates from Cisco regarding this issue.