CVE-2021-34761

A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:7.1.0:*:*:*:*:*:*:*

History

27 Oct 2022, 16:44

Type Values Removed Values Added
CWE CWE-20 CWE-668

28 Oct 2021, 14:51

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sourcefire_defense_center:6.7.0:*:*:*:*:*:*:*
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : 6.6
v3 : 6.0
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-write-SHVcmQVc - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-write-SHVcmQVc - Vendor Advisory

27 Oct 2021, 20:15

Type Values Removed Values Added
Summary A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges. A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.

27 Oct 2021, 19:35

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-27 19:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-34761

Mitre link : CVE-2021-34761

CVE.ORG link : CVE-2021-34761


JSON object : View

Products Affected

cisco

  • firepower_management_center_virtual_appliance
  • sourcefire_defense_center
  • firepower_threat_defense
CWE
CWE-668

Exposure of Resource to Wrong Sphere

CWE-73

External Control of File Name or Path