CVE-2020-3455 Vulnerability Analysis & Exploit Details

Status: Analyzed - Last modified: 28 Oct 2020, 20:52 UTC Published: 21 Oct 2020, 19:15 UTC

CVE-2020-3455
Vulnerability Scoring

7.8
/10

Attack Complexity Details

  • Attack Complexity: Low Impact
  • Attack Vector: LOCAL
  • Privileges Required: Low Impact
  • Scope: UNCHANGED
  • User Interaction: NONE

CIA Impact Definition

  • Confidentiality: HIGH IMPACT
  • Integrity: HIGH IMPACT
  • Availability: HIGH IMPACT

CVE-2020-3455 Vulnerability Summary

A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.

Access Complexity Graph

Above is the Access Complexity Graph for CVE-2020-3455. It helps visualize the difficulty level and privilege requirements needed to exploit this vulnerability, providing a quick assessment of its exploitation feasibility.

CVSS Score Breakdown Chart

Above is the CVSS Sub-score Breakdown for CVE-2020-3455, illustrating how Base, Impact, and Exploitability factors combine to form the overall severity rating. A higher sub-score typically indicates a more severe or easier-to-exploit vulnerability.

Impact Analysis

Below is the Impact Analysis for CVE-2020-3455, showing how Confidentiality, Integrity, and Availability might be affected if the vulnerability is exploited. Higher values usually signal greater potential damage.

Exploit Prediction Scoring System (EPSS)

The EPSS score estimates the probability that this vulnerability will be exploited in the near future.

EPSS Score: 0.042% (probability of exploit)

EPSS Percentile: 5.02% (lower percentile = lower relative risk)
This vulnerability is less risky than approximately 94.98% of others.

CVE-2020-3455 Detailed Information and External References

References

CWE

CWE-693

CAPEC

  • Accessing Functionality Not Properly Constrained by ACLs CAPEC-1 In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application, or can run queries for data that they otherwise not supposed to.
  • Cross Site Tracing CAPEC-107 Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server.
  • Directory Indexing CAPEC-127 An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files, configuration files, user accounts, script contents, as well as naming conventions, all of which can be used by an attacker to mount additional attacks.
  • Using Malicious Files CAPEC-17 An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.
  • Encryption Brute Forcing CAPEC-20 An attacker, armed with the cipher text and the encryption algorithm used, performs an exhaustive (brute force) search on the key space to determine the key that decrypts the cipher text to obtain the plaintext.
  • Exploiting Trust in Client CAPEC-22 An attack of this type exploits vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by communicating directly with the server where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Escaping a Sandbox by Calling Code in Another Language CAPEC-237 The attacker may submit malicious code of another language to obtain access to privileges that were not intentionally exposed by the sandbox, thus escaping the sandbox. For instance, Java code cannot perform unsafe operations, such as modifying arbitrary memory locations, due to restrictions placed on it by the Byte code Verifier and the JVM. If allowed, Java code can call directly into native C code, which may perform unsafe operations, such as call system calls and modify arbitrary memory locations on their behalf. To provide isolation, Java does not grant untrusted code with unmediated access to native C code. Instead, the sandboxed code is typically allowed to call some subset of the pre-existing native code that is part of standard libraries.
  • Using Unpublished Interfaces or Functionality CAPEC-36 An adversary searches for and invokes interfaces or functionality that the target system designers did not intend to be publicly available. If interfaces fail to authenticate requests, the attacker may be able to invoke functionality they are not authorized for.
  • Signature Spoofing by Mixing Signed and Unsigned Content CAPEC-477 An attacker exploits the underlying complexity of a data structure that allows for both signed and unsigned content, to cause unsigned data to be processed as though it were signed data.
  • Escaping Virtualization CAPEC-480 An adversary gains access to an application, service, or device with the privileges of an authorized or privileged user by escaping the confines of a virtualized environment. The adversary is then able to access resources or execute unauthorized code within the host environment, generally with the privileges of the user running the virtualized process. Successfully executing an attack of this type is often the first step in executing more complex attacks.
  • Poison Web Service Registry CAPEC-51 SOA and Web Services often use a registry to perform look up, get schema information, and metadata about services. A poisoned registry can redirect (think phishing for servers) the service requester to a malicious service provider, provide incorrect information in schema or metadata, and delete information about service provider interfaces.
  • Utilizing REST's Trust in the System Resource to Obtain Sensitive Data CAPEC-57 This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to obtain sensitive data once SSL is terminated.
  • Session Credential Falsification through Prediction CAPEC-59 This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.
  • Sniff Application Code CAPEC-65 An adversary passively sniffs network communications and captures application code bound for an authorized client. Once obtained, they can use it as-is, or through reverse-engineering glean sensitive information or exploit the trust relationship between the client and server. Such code may belong to a dynamic update to the client, a patch being applied to a client component or any such interaction where the client is authorized to communicate with the server.
  • Key Negotiation of Bluetooth Attack (KNOB) CAPEC-668 An adversary can exploit a flaw in Bluetooth key negotiation allowing them to decrypt information sent between two devices communicating via Bluetooth. The adversary uses an Adversary in the Middle setup to modify packets sent between the two devices during the authentication process, specifically the entropy bits. Knowledge of the number of entropy bits will allow the attacker to easily decrypt information passing over the line of communication.
  • Manipulating State CAPEC-74 The adversary modifies state information maintained by the target software or causes a state transition in hardware. If successful, the target will use this tainted state and execute in an unintended manner. State management is an important function within a software application. User state maintained by the application can include usernames, payment information, browsing history as well as application-specific contents such as items in a shopping cart. Manipulating user state can be employed by an adversary to elevate privilege, conduct fraudulent transactions or otherwise modify the flow of the application to derive certain benefits. If there is a hardware logic error in a finite state machine, the adversary can use this to put the system in an undefined state which could cause a denial of service or exposure of secure data.
  • Forceful Browsing CAPEC-87 An attacker employs forceful browsing (direct URL entry) to access portions of a website that are otherwise unreachable. Usually, a front controller or similar design pattern is employed to protect access to portions of a web application. Forceful browsing enables an attacker to access information, perform privileged operations and otherwise reach sections of the web application that have been improperly protected.

Vulnerable Configurations

  • cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:-:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:-:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1\(1.86\):*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1\(1.86\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1.147:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1.147:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1\(1.160\):*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1\(1.160\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1.160:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.1.160:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.2.51:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.2.51:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.2.178:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.2.178:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.84:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.84:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.86:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.86:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.97:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.3.97:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.95:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.95:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.117:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.117:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.140:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.140:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.169:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.169:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.175:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.175:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.178:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.178:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.179:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:1.1.4.179:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.37:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.37:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.68:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.68:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.86:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.86:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.135:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.135:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.141:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.141:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.144:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.144:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.148:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.148:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.149:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.149:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.153:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.153:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.159:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.159:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.188:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.188:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.201:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.201:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.203:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.203:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.204:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.204:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.206:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.0.1.206:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.64:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.64:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.73:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.73:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.77:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.77:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.83:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.83:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.85:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.85:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.86:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.86:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.97:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.97:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.106:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.106:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.107:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.107:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.113:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.113:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.115:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.115:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.116:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.1.1.116:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2\(1.58\):*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2\(1.58\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.63:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.63:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.66:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.66:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.70:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.70:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.17:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.17:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.19:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.19:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.24:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.24:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.26:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.26:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.28:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.28:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.54:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.54:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.60:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.60:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.71:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.71:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.83:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.83:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.86:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.86:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.91:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.91:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.97:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.97:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.101:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.101:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.137:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.137:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.148:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.148:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.149:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.149:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.56:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.56:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.58:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.58:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.66:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.66:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.73:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.73:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.75:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.75:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.88:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.88:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.91:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.91:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.93:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.93:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.99:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.99:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.110:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.110:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.111:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.111:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.130:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.130:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.144:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.144:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.145:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.145:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.155:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.155:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.166:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.166:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.173:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.173:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.179:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.179:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.180:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.180:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.190:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.190:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.215:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.215:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.216:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.216:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.219:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.219:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.101:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.101:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.214:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.214:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.216:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.216:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.222:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.222:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.234:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.234:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.238:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.238:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.244:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.244:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4\(1.249\):*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4\(1.249\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.249:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.249:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.252:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.252:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.266:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.4.1.266:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.131:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.131:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.157:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.157:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.166:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.166:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.169:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.169:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.174:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.174:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.187:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.187:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.192:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.192:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.204:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.204:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.92:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.92:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.98:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.98:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.106:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.106:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.122:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:firepower_extensible_operating_system:2.7.1.122:*:*:*:*:*:*:*

CVSS3 Source

nvd@nist.gov

CVSS3 Type

Primary

CVSS3 Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Other Recently Published CVEs

  • CVE-2025-1441 – The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7...
  • CVE-2025-22622 – Age Verification for your checkout page. Verify your customer's identity 1.20.0 was found to be vulnerable. The web application dynamically generat...
  • CVE-2024-13443 – The Easypromos Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Easypromos shortcode in all versions up to...
  • CVE-2024-11582 – The Subscribe2 – Form, Email Subscribers & Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ip parameter in al...
  • CVE-2025-1448 – A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown ...
  • CVE-2024-57262 – In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem ...
  • CVE-2024-57261 – In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258.
  • CVE-2025-1447 – A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /p...
  • CVE-2024-13508 – The Booking Package plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the locale parameter in all versions up to, and includ...
  • CVE-2025-27113 – libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.