A vulnerability has been discovered in the Cisco Secure Firewall Management Center Software, formerly Firepower Management Center Software, that could allow an authenticated remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is caused by improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document containing sensitive information. A successful exploit could allow the attacker to alter the standard layout of device-generated documents, access arbitrary files from the underlying operating system, and conduct server-side request forgery attacks. To exploit this vulnerability, an attacker would need valid credentials for a user account with policy-editing permissions. Cisco has released software updates to address this vulnerability, but there are no workarounds available. The advisory for this vulnerability is available on the Cisco website and is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. The Security Impact Rating for this vulnerability is Medium. The CVE number for this vulnerability is CVE-2024-20274. Users are advised to apply the software updates to prevent potential attacks.
sec.cloudapps.cisco.com
sec.cloudapps.cisco.com
