ID

VAR-202110-1298


CVE

CVE-2021-34755


TITLE

Cisco Firepower Threat Defense  Input validation vulnerability in software

Trust: 0.8

sources: JVNDB: JVNDB-2021-018452

DESCRIPTION

Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Firepower Threat Defense (FTD) The software contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit these vulnerabilities by submitting crafted input to the affected command

Trust: 1.71

sources: NVD: CVE-2021-34755 // JVNDB: JVNDB-2021-018452 // VULHUB: VHN-394997

AFFECTED PRODUCTS

vendor:ciscomodel:firepower threat defensescope:gteversion:7.0.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:7.0.1

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.7.0.3

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.4.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.4.0.13

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.1.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.6.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.1.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.6.1

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.6.1

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.2.3

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.6.5

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.2.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.2.3

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.7.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:7.0.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.2.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:7.0.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.5.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.4.0.11

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:sourcefire defense centerscope:eqversion:6.7.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.5.0

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.4.0.11

Trust: 1.0

vendor:ciscomodel:firepower management center virtual appliancescope:eqversion:6.7.0

Trust: 1.0

vendor:シスコシステムズmodel:cisco sourcefire defense centerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco firepower threat defense ソフトウェアscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco firepower management centerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-018452 // NVD: CVE-2021-34755

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34755
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2021-34755
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-34755
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202110-2013
value: HIGH

Trust: 0.6

VULHUB: VHN-394997
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-34755
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-394997
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-34755
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-34755
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-34755
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-394997 // JVNDB: JVNDB-2021-018452 // CNNVD: CNNVD-202110-2013 // NVD: CVE-2021-34755 // NVD: CVE-2021-34755

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-394997 // JVNDB: JVNDB-2021-018452 // NVD: CVE-2021-34755

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202110-2013

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202110-2013

PATCH

title:cisco-sa-ftd-cmdinject-FmzsLN8url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8

Trust: 0.8

title:Cisco Firepower Threat Defense Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=168744

Trust: 0.6

sources: JVNDB: JVNDB-2021-018452 // CNNVD: CNNVD-202110-2013

EXTERNAL IDS

db:NVDid:CVE-2021-34755

Trust: 3.3

db:JVNDBid:JVNDB-2021-018452

Trust: 0.8

db:CNNVDid:CNNVD-202110-2013

Trust: 0.7

db:AUSCERTid:ESB-2021.3597

Trust: 0.6

db:CS-HELPid:SB2021102910

Trust: 0.6

db:VULHUBid:VHN-394997

Trust: 0.1

sources: VULHUB: VHN-394997 // JVNDB: JVNDB-2021-018452 // CNNVD: CNNVD-202110-2013 // NVD: CVE-2021-34755

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ftd-cmdinject-fmzsln8

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-34755

Trust: 1.4

url:https://www.cybersecurity-help.cz/vdb/sb2021102910

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3597

Trust: 0.6

sources: VULHUB: VHN-394997 // JVNDB: JVNDB-2021-018452 // CNNVD: CNNVD-202110-2013 // NVD: CVE-2021-34755

SOURCES

db:VULHUBid:VHN-394997
db:JVNDBid:JVNDB-2021-018452
db:CNNVDid:CNNVD-202110-2013
db:NVDid:CVE-2021-34755

LAST UPDATE DATE

2024-08-14T13:53:52.449000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-394997date:2022-10-27T00:00:00
db:JVNDBid:JVNDB-2021-018452date:2023-06-15T03:03:00
db:CNNVDid:CNNVD-202110-2013date:2022-10-31T00:00:00
db:NVDid:CVE-2021-34755date:2023-11-07T03:36:18.923

SOURCES RELEASE DATE

db:VULHUBid:VHN-394997date:2021-10-27T00:00:00
db:JVNDBid:JVNDB-2021-018452date:2023-06-15T00:00:00
db:CNNVDid:CNNVD-202110-2013date:2021-10-27T00:00:00
db:NVDid:CVE-2021-34755date:2021-10-27T19:15:07.883