A critical vulnerability in the Cisco Firepower Management Center (FMC) could allow a remote attacker to bypass authentication and execute arbitrary actions on affected devices as administrator.
The issue, Cisco explains, emerges from the improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external server. Thus, an attacker could send crafted HTTP requests to an affected device and gain administrative access to the web-based management interface.
Cisco FMC is affected only if it was configured to authenticate users of the web-based management interface through an external LDAP server, Cisco explains.
The vulnerability is tracked as CVE-2019-16028 and features a CVSS score of 9.8.
Fixes were included in Cisco FMC Software versions 188.8.131.52 and 184.108.40.206. The company also plans on releasing fixes for versions 6.2.3 (220.127.116.11) and 6.3.0 (18.104.22.168) in February and May 2020, respectively.
This week, Cisco also released 7 patches for 8 High severity vulnerabilities impacting Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software; IOS XE SD-WAN Software; SD-WAN Solution vManage software, Smart Software Manager On-Prem, and IOS XR Software.
Successful exploitation of these flaws could lead to directory traversal attacks, unauthorized access to affected devices, privilege escalation, and denial of service (DoS).
Cisco has released software updates to address all of these flaws and affected customers are advised to apply them as soon as possible, to ensure they are protected.
The company says that it is not aware of any “public announcements or malicious use” of these vulnerabilities.
Additionally, Cisco released security updates to address 18 Medium severity security flaws in Webex Teams for Windows, Unified Communications Manager, Jabber Guest, Application Policy Infrastructure Controller, Email Security Appliance, Unity Connection Software, Web Security ..