mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
183 lines
8.5 KiB
JSON
183 lines
8.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-20412",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials.\r\n\r This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Use of Hard-coded Password",
|
|
"cweId": "CWE-259"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Firepower Threat Defense Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.0.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.4.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.5.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.5.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.1.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.1.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.4.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.4.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.4.1.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-ftd-statcred-dFC8tXT5",
|
|
"discovery": "INTERNAL",
|
|
"defects": [
|
|
"CSCwk07982"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"baseScore": 9.3,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
}
|
|
]
|
|
}
|
|
} |