Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability

🚨 SEVERITY: MEDIUM — CVSS 4.9 Security Advisory

TL;DR 📌

A medium-severity XPATH injection vulnerability has been identified in the Cisco Secure Firewall Management Center (FMC) Software, allowing authenticated attackers to retrieve sensitive information. There are no workarounds available, and users are advised to apply the necessary software updates.

What happened 🕵️‍♂️

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software has been discovered. This vulnerability arises from insufficient input validation, enabling an authenticated remote attacker to send crafted requests to the management interface. Successful exploitation could lead to the retrieval of sensitive information from the affected device. Importantly, the attacker must possess valid administrative credentials to exploit this vulnerability.

Affected products 🖥️

The vulnerability affects Cisco Secure FMC Software when lockdown mode is enabled. Lockdown mode is disabled by default, which may limit exposure. Other Cisco products, such as Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software, are confirmed not to be vulnerable.

Fixed software 🔧

Upgrade to the first fixed release in your train (or later):

Release / Product First Fixed Release Notes
1.0 Initial public release.

Workarounds 🧯

There are no workarounds available to mitigate this vulnerability.

Risk in context 🎯

With a CVSS score of 4.9, this vulnerability is classified as Medium severity. The exposure requires administrative credentials, which mitigates the risk somewhat. However, the potential for sensitive information retrieval makes it important for affected users to apply the necessary updates promptly.

Fast facts ⚡

  • Vulnerability: XPATH injection in Cisco Secure FMC Software
  • CVSS Score: 4.9 (Medium)
  • Exploitation: Requires valid administrative credentials
  • Workarounds: None available
  • Fixed Software: Updates released by Cisco

For leadership 🧭

This vulnerability poses a Medium risk to your organization, primarily affecting those using Cisco Secure Firewall Management Center Software with lockdown mode enabled. The exposure is limited to authenticated users, which reduces the likelihood of exploitation. However, the potential for sensitive data retrieval remains a concern.

Remediation ask: Patch within 7 days, as fixes are available.

Operational impact: Expect a brief maintenance window with no configuration drift anticipated.

Clear Now / Next / Later:

  • Now: Review affected systems and confirm lockdown mode status.
  • Next: Schedule and apply the necessary software updates.
  • Later: Monitor for any further advisories or updates from Cisco regarding this vulnerability.