Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability
A vulnerability in the backup restore functionality of Cisco ASA and Firepower Threat Defense (FTD) Software allows an authenticated, local attacker with administrator-level privileges to execute arbitrary commands with root-level access on the underlying Linux operating system. The vulnerability exists because backup file contents are improperly sanitized at restore time. An attacker could exploit this by restoring a crafted backup file, leading to complete system compromise and potential disruption or modification of firewall rules and network filtering policies.
- Administrator-level credentials on the affected firewall
- Access to the firewall management interface (local or remote management access)
- Ability to upload and restore a backup file
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a57ce7b2-6a88-4256-a7e2-b5d25ac26756Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.