Network Security

Cisco Patches Critical Flaws in Firepower Management Center

During an internal security review, Cisco discovered that its Firepower Management Center product is plagued by several issues, including critical privilege escalation and command execution vulnerabilities.

<p><strong><span><span style="font-family: &quot;trebuchet ms&quot;, geneva;"><span>During an internal security review, Cisco discovered that its Firepower Management Center product is plagued by several issues, including critical privilege escalation and command execution vulnerabilities.</span></span></span></strong></p>

During an internal security review, Cisco discovered that its Firepower Management Center product is plagued by several issues, including critical privilege escalation and command execution vulnerabilities.

The Firepower Management Center is described by the vendor as the administrative nerve center for managing Cisco network security solutions, including firewall, intrusion prevention, application control, advanced malware protection and URL filtering products.

Cisco discovered several flaws in the appliance’s web-based graphical user interface (GUI). One of the critical issues, tracked as CVE-2016-1457, allows an authenticated attacker to remotely execute arbitrary commands on the affected device with root-level privileges.

The security hole, caused by insufficient authorization checking, affects Firepower Management Center and the Cisco ASA 5500-X series with FirePOWER Services versions 5.4.0, 5.3.1, 5.3.0.4, 5.2.0 and 4.10.3.9. The bug has been addressed in versions 5.3.1.2, 5.4.0.1, 5.4.1 and 6.0.0.

Another critical vulnerability, identified as CVE-2016-1458, allows an authenticated attacker to elevate the privileges of user accounts on the targeted device. The weakness affects the same products and versions as CVE-2016-1457.

Cisco has also identified a medium severity cross-site scripting (XSS) flaw in Firepower Management Center. The flaw can be exploited by a remote, unauthenticated attacker to launch XSS attacks against a user by getting them to access a specially crafted link or by intercepting their requests and injecting them with malicious code.

No workarounds are available for these issues. Cisco says there is no evidence that the flaws have been exploited in the wild.

Cisco also warned users on Wednesday that it has identified a high severity zero-day vulnerability after analyzing the exploits leaked by a threat group calling itself Shadow Brokers. The flaw remains unpatched, but the networking giant has provided some workarounds.

Shadow Brokers has leaked hundreds of megabytes of exploits and implants allegedly stolen from the NSA-linked Equation Group. The exploits published by the hackers also target products from Fortinet, Chinese company TOPSEC, Juniper Networks, WatchGuard and several unknown vendors.

Advertisement. Scroll to continue reading.

Related: Cisco Fixes Flaws in Network Analysis Modules

Related: No Patch for Critical RCE Flaw in Cisco Routers

Related: Cisco, Juniper Patch Operating System Flaws

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version