Vulnerability Details : CVE-2021-34761
A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Vulnerability category: File inclusion
Products affected by CVE-2021-34761
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:6.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:6.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:6.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sourcefire_defense_center:7.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-34761
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-34761
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:C/A:C |
3.9
|
9.2
|
NIST | |
4.4
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
0.8
|
3.6
|
Cisco Systems, Inc. | |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
0.8
|
5.2
|
NIST |
CWE ids for CVE-2021-34761
-
The product allows user input to control or influence paths or file names that are used in filesystem operations.Assigned by: ykramarz@cisco.com (Secondary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-34761
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-write-SHVcmQVc
Cisco Firepower Threat Defense Software CLI Arbitrary File Write VulnerabilityVendor Advisory
Jump to