Loading HuntDB...

Cisco Firepower Threat Defense Software

93 Versions 86 CVEs

Versions

7.2.4

SEMANTIC 32 CVEs

6.4.0.16

OTHER 33 CVEs

6.4.0.8

OTHER 39 CVEs

7.1.0.2

OTHER 48 CVEs

7.0.5

SEMANTIC 42 CVEs

6.7.0.2

OTHER 46 CVEs

7.1.0

SEMANTIC 54 CVEs

7.3.1.2

OTHER 27 CVEs

7.0.6.1

OTHER 23 CVEs

6.4.0.15

OTHER 36 CVEs

7.0.6

SEMANTIC 25 CVEs

7.2.7

SEMANTIC 14 CVEs

7.2.8.1

OTHER 13 CVEs

7.2.0.1

OTHER 53 CVEs

6.2.3.12

OTHER 37 CVEs

7.3.0

SEMANTIC 46 CVEs

7.4.2

SEMANTIC 5 CVEs

6.2.3

SEMANTIC 37 CVEs

7.2.5.1

OTHER 24 CVEs

6.2.3.14

OTHER 37 CVEs

7.3.1.1

OTHER 46 CVEs

7.4.1

SEMANTIC 24 CVEs

6.2.3.3

OTHER 37 CVEs

7.2.4.1

OTHER 26 CVEs

7.0.2

SEMANTIC 48 CVEs

6.2.3.13

OTHER 37 CVEs

6.2.3.1

OTHER 36 CVEs

6.2.3.5

OTHER 37 CVEs

6.4.0.6

OTHER 39 CVEs

6.7.0

SEMANTIC 45 CVEs

6.4.0.18

OTHER 13 CVEs

7.1.0.3

OTHER 45 CVEs

7.0.3

SEMANTIC 48 CVEs

7.1.0.1

OTHER 54 CVEs

6.2.3.15

OTHER 37 CVEs

6.6.7.2

OTHER 19 CVEs

6.4.0

SEMANTIC 38 CVEs

6.6.1

SEMANTIC 43 CVEs

6.2.3.10

OTHER 37 CVEs

6.4.0.7

OTHER 38 CVEs

7.2.0

SEMANTIC 53 CVEs

7.0.0.1

OTHER 52 CVEs

7.0.4

SEMANTIC 43 CVEs

6.6.0

SEMANTIC 42 CVEs

7.3.1

SEMANTIC 46 CVEs

7.2.8

SEMANTIC 13 CVEs

7.4.0

SEMANTIC 24 CVEs

7.0.0

SEMANTIC 52 CVEs

7.0.1

SEMANTIC 51 CVEs

7.2.5

SEMANTIC 26 CVEs

7.0.6.3

OTHER 1 CVE

7.2.5.2

OTHER 21 CVEs

6.4.0.3

OTHER 38 CVEs

6.4.0.12

OTHER 41 CVEs

6.2.3.18

OTHER 39 CVEs

6.4.0.14

OTHER 40 CVEs

6.4.0.1

OTHER 38 CVEs

6.2.3.2

OTHER 36 CVEs

6.6.7

SEMANTIC 35 CVEs

6.2.3.11

OTHER 37 CVEs

6.2.3.9

OTHER 37 CVEs

7.0.1.1

OTHER 51 CVEs

6.6.5.2

OTHER 41 CVEs

6.4.0.5

OTHER 38 CVEs

6.4.0.17

OTHER 19 CVEs

6.6.5

SEMANTIC 43 CVEs

6.7.0.1

OTHER 45 CVEs

unspecified

OTHER 18 CVEs

6.6.4

SEMANTIC 43 CVEs

6.2.3.8

OTHER 37 CVEs

6.7.0.3

OTHER 45 CVEs

7.4.1.1

OTHER 20 CVEs

6.4.0.2

OTHER 38 CVEs

6.6.3

SEMANTIC 43 CVEs

7.2.1

SEMANTIC 45 CVEs

7.2.2

SEMANTIC 46 CVEs

6.2.3.16

OTHER 39 CVEs

6.6.0.1

OTHER 43 CVEs

7.0.2.1

OTHER 48 CVEs

7.2.6

SEMANTIC 14 CVEs

6.6.7.1

OTHER 33 CVEs

7.2.3

SEMANTIC 45 CVEs

6.2.3.4

OTHER 37 CVEs

6.4.0.11

OTHER 40 CVEs

6.4.0.9

OTHER 39 CVEs

6.4.0.10

OTHER 41 CVEs

6.6.5.1

OTHER 43 CVEs

6.4.0.13

OTHER 39 CVEs

6.4.0.4

OTHER 39 CVEs

6.2.3.6

OTHER 37 CVEs

6.2.3.7

OTHER 37 CVEs

6.2.3.17

OTHER 39 CVEs

7.0.6.2

OTHER 12 CVEs

Recent CVEs

CVE-2021-34752

A vulnerability in the CLI of Cisco FTD Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands with root privileges on the underlying operating system of an affected device.  This vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute commands with root privileges on the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

MEDIUM Nov 15, 2024

CVE-2022-20940

A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device.

MEDIUM Nov 10, 2022

CVE-2022-20928

A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user. This vulnerability is due to a flaw in the authorization verifications during the VPN authentication flow. An attacker could exploit this vulnerability by sending a crafted packet during a VPN authentication. The attacker must have valid credentials to establish a VPN connection. A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user.

MEDIUM Nov 10, 2022

CVE-2022-20934

A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.

MEDIUM Nov 10, 2022

CVE-2022-20949

A vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on an affected system. This vulnerability exists because access to HTTPS endpoints is not properly restricted on an affected device. An attacker could exploit this vulnerability by sending specific messages to the affected HTTPS handler. A successful exploit could allow the attacker to perform configuration changes on the affected system, which should be configured and managed only through Cisco Firepower Management Center (FMC) Software.

MEDIUM Nov 10, 2022

CVE-2022-20924

A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

HIGH Nov 10, 2022

CVE-2022-20927

A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

HIGH Nov 10, 2022

CVE-2022-20947

A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

HIGH Nov 10, 2022

CVE-2022-20946

A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory handling error that occurs when GRE traffic is processed. An attacker could exploit this vulnerability by sending a crafted GRE payload through an affected device. A successful exploit could allow the attacker to cause the device to restart, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

HIGH Nov 10, 2022

CVE-2022-20713

A vulnerability in the VPN web client services component of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device. This vulnerability is due to improper validation of input that is passed to the VPN web client services component before being returned to the browser that is in use. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious requests to a device that is running Cisco ASA Software or Cisco FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting attacks. The attacker could not directly impact the affected device.

MEDIUM Aug 10, 2022