mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
150 lines
6.7 KiB
JSON
150 lines
6.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-20361",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Permissions, Privileges, and Access Control",
|
|
"cweId": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Firepower Management Center",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.1.0.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.0.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.2.3.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.3.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Cisco Firepower Threat Defense Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "N/A"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-fmc-object-bypass-fTH8tDjq",
|
|
"discovery": "EXTERNAL",
|
|
"defects": [
|
|
"CSCwd66820"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
|
"baseScore": 5.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
}
|
|
]
|
|
}
|
|
} |