Guest

Preview Tool

Cisco Bug: CSCvh68311 - Cisco Firepower System Software Cross-Origin Domain Protection Vulnerability

Last Modified

Apr 02, 2019

Products (1)

  • Cisco Firepower Management Center

Known Affected Releases

6.1.0 6.2.0 6.2.1 6.2.2 6.2.3

Description (partial)

Symptom:
A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote attacker to access sensitive
data about the system.

The vulnerability is due to improper cross-origin domain protections for Websocket protocol. An attacker could exploit this vulnerability by
convincing a user to visit a malicious website designed to send requests to the affected application while the user is logged into the
application with an active session cookie. An exploit could allow the attacker to retrieve policy or configuration information from the affected
software and allow to perform another atack against the management console.

Conditions:
Please refer to the Security Advisory.

Related Community Discussions

<key>CSCvh68311</key> - Cisco Firepower System Software Cross-Origin Domain Protection Vulnerability
Hi,   Refer to the bug documentations, there is a lot of affected version on this vulnerability and it doesn't have any fixed release for it. Any idea on the workaround or fixed release on FMC?   Current FMC and FTD version : 6.2.3   Does it impact to non-join domain environment? Kindly advise.    
Latest activity: May 16, 2018
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.