cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20294,https://securityvulnerability.io/vulnerability/CVE-2024-20294,Cisco FXOS Software Vulnerability Could Lead to Denial of Service,"A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device. Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).",Cisco,"Cisco Nx-os Software,Cisco Unified Computing System (managed),Cisco Firepower Extensible Operating System (fxos),Cisco Nx-os System Software In Aci Mode",6.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-29T01:43:00.000Z,0 CVE-2023-20234,https://securityvulnerability.io/vulnerability/CVE-2023-20234,Arbitrary File Manipulation in Cisco FXOS Software,"A vulnerability exists in the CLI of Cisco FXOS Software that could allow an authenticated local attacker to create or overwrite files on the filesystem of an affected device, including critical system files. This issue arises due to a lack of parameter validation during the execution of specific CLI commands. If an attacker successfully authenticates to the device with valid administrative credentials, they could exploit this vulnerability to manipulate files on the disk, potentially jeopardizing system integrity and functionality.",Cisco,"Cisco Adaptive Security Appliance (ASA) Software,Cisco Firepower Threat Defense Software,Cisco Firepower Extensible Operating System (FXOS)",6,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-08-23T19:15:00.000Z,0 CVE-2023-20200,https://securityvulnerability.io/vulnerability/CVE-2023-20200,Denial of Service Vulnerability in Cisco FXOS and UCS 6300 Series,"A vulnerability exists in the Simple Network Management Protocol (SNMP) service of certain Cisco devices, allowing an authenticated, remote attacker to induce a denial of service condition. This flaw arises from the improper handling of crafted SNMP requests, potentially leading to device reloads. Exploiting this vulnerability requires knowledge of the SNMP community string on SNMPv2c or earlier, or valid SNMP user credentials on SNMPv3.",Cisco,"Cisco Unified Computing System (Managed),Cisco Firepower Extensible Operating System (FXOS)",6.3,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2023-08-23T19:15:00.000Z,0 CVE-2022-20934,https://securityvulnerability.io/vulnerability/CVE-2022-20934,Command Injection Vulnerability in Cisco Firepower Threat Defense Software,"A flaw in the command-line interface (CLI) of Cisco Firepower Threat Defense Software and Cisco FXOS Software enables authenticated local attackers to execute arbitrary commands at the operating system level. This vulnerability arises from inadequate input validation for certain CLI commands, potentially allowing attackers to introduce operating system commands into legitimate commands. A successful exploit requires valid Administrator credentials, permitting attackers to bypass the restricted command prompt and launch arbitrary commands on the underlying system.",Cisco,"Cisco Firepower Threat Defense Software,Cisco Firepower Extensible Operating System (fxos)",6,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-03T03:15:48.000Z,,false,false,,2022-11-15T21:15:00.000Z,0 CVE-2022-20865,https://securityvulnerability.io/vulnerability/CVE-2022-20865,Cisco FXOS Software Command Injection Vulnerability,"A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.",Cisco,Cisco Firepower Extensible Operating System (fxos),6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-03T03:15:44.000Z,,false,false,,2022-08-25T19:15:00.000Z,0 CVE-2020-3455,https://securityvulnerability.io/vulnerability/CVE-2020-3455,Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability,"A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.",Cisco,Cisco Firepower Extensible Operating System (fxos),6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T08:16:41.000Z,,false,false,,2020-10-21T00:00:00.000Z,0 CVE-2020-3459,https://securityvulnerability.io/vulnerability/CVE-2020-3459,Cisco FXOS Software for Firepower 4100/9300 Series Command Injection Vulnerability,"A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.",Cisco,Cisco Firepower Extensible Operating System (fxos),6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T08:16:41.000Z,,false,false,,2020-10-21T00:00:00.000Z,0 CVE-2020-3545,https://securityvulnerability.io/vulnerability/CVE-2020-3545,Cisco FXOS Software Buffer Overflow Vulnerability,"A vulnerability in Cisco FXOS Software could allow an authenticated, local attacker with administrative credentials to cause a buffer overflow condition. The vulnerability is due to incorrect bounds checking of values that are parsed from a specific file. An attacker could exploit this vulnerability by supplying a crafted file that, when it is processed, may cause a stack-based buffer overflow. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system with root privileges. An attacker would need to have valid administrative credentials to exploit this vulnerability.",Cisco,Cisco Firepower Extensible Operating System (fxos),6,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T08:16:45.000Z,,false,false,,2020-09-04T03:15:00.000Z,0 CVE-2020-3169,https://securityvulnerability.io/vulnerability/CVE-2020-3169,Cisco FXOS Software CLI Command Injection Vulnerability,"A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. An attacker would need valid administrator credentials to exploit this vulnerability.",Cisco,Cisco Firepower Extensible Operating System (fxos),6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T08:16:27.000Z,,false,false,,2020-02-26T00:00:00.000Z,0 CVE-2020-3166,https://securityvulnerability.io/vulnerability/CVE-2020-3166,Cisco FXOS Software CLI Arbitrary File Read and Write Vulnerability,"A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to read or write arbitrary files on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to a specific CLI command. A successful exploit could allow the attacker to read or write to arbitrary files on the underlying OS.",Cisco,Cisco Firepower Extensible Operating System (fxos),4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T08:16:27.000Z,,false,false,,2020-02-26T00:00:00.000Z,0 CVE-2019-12699,https://securityvulnerability.io/vulnerability/CVE-2019-12699,Cisco FXOS Software and Firepower Threat Defense Software Command Injection Vulnerabilities,"Multiple vulnerabilities in the CLI of Cisco FXOS Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute commands on the underlying operating system (OS) with root privileges. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by including crafted arguments to specific CLI commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges.",Cisco,Cisco Firepower Extensible Operating System (fxos),8.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-09-16T20:17:52.000Z,,false,false,,2019-10-02T00:00:00.000Z,0 CVE-2019-1858,https://securityvulnerability.io/vulnerability/CVE-2019-1858,Cisco FXOS and NX-OS Software Simple Network Management Protocol Denial of Service Vulnerability,"A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the SNMP application to leak system memory, which could cause an affected device to restart unexpectedly. The vulnerability is due to improper error handling when processing inbound SNMP packets. An attacker could exploit this vulnerability by sending multiple crafted SNMP packets to an affected device. A successful exploit could allow the attacker to cause the SNMP application to leak system memory because of an improperly handled error condition during packet processing. Over time, this memory leak could cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.",Cisco,Cisco Firepower Extensible Operating System (fxos),8.6,HIGH,0.0010900000343099236,false,,false,false,true,2024-08-04T19:16:14.000Z,,false,false,,2019-05-16T02:29:00.000Z,0 CVE-2019-1700,https://securityvulnerability.io/vulnerability/CVE-2019-1700,Cisco Firepower 9000 Series Firepower 2-Port 100G Double-Width Network Module Queue Wedge Denial of Service Vulnerability,"A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. Manual intervention may be required before a device will resume normal operations. The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets. An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device. A successful exploit could allow the attacker to cause a queue wedge condition on the interface. When a wedge occurs, the affected device will stop processing any additional packets that are received on the wedged interface. Version 2.2 is affected.",Cisco,Cisco Firepower Extensible Operating System (fxos),6.1,MEDIUM,0.0005300000193528831,false,,false,false,true,2024-08-04T19:16:05.000Z,,false,false,,2019-02-21T21:29:00.000Z,0 CVE-2017-3883,https://securityvulnerability.io/vulnerability/CVE-2017-3883,,"A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability occurs because AAA processes prevent the NX-OS System Manager from receiving keepalive messages when an affected device receives a high rate of login attempts, such as in a brute-force login attack. System memory can run low on the FXOS devices under the same conditions, which could cause the AAA process to unexpectedly restart or cause the device to reload. An attacker could exploit this vulnerability by performing a brute-force login attack against a device that is configured with AAA security services. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects the following Cisco products if they are running Cisco FXOS or NX-OS System Software that is configured for AAA services: Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System (UCS) 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCuq58760, CSCuq71257, CSCur97432, CSCus05214, CSCux54898, CSCvc33141, CSCvd36971, CSCve03660.",Cisco,Firepower Extensible Operating System,8.6,HIGH,0.002219999907538295,false,,false,false,false,,,false,false,,2017-10-19T08:00:00.000Z,0 CVE-2015-6435,https://securityvulnerability.io/vulnerability/CVE-2015-6435,,"An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888.",Cisco,Firepower Extensible Operating System,9.8,CRITICAL,0.0010600000387057662,false,,false,false,false,,,false,false,,2016-01-22T11:00:00.000Z,0 CVE-2015-6380,https://securityvulnerability.io/vulnerability/CVE-2015-6380,,"An unspecified script in the web interface in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows remote authenticated users to execute arbitrary OS commands via crafted parameters, aka Bug ID CSCux10622.",Cisco,Firepower Extensible Operating System,,,0.0019499999471008778,false,,false,false,false,,,false,false,,2015-11-24T02:00:00.000Z,0 CVE-2015-6369,https://securityvulnerability.io/vulnerability/CVE-2015-6369,,"The USB driver in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows physically proximate attackers to cause a denial of service via a crafted USB device that triggers invalid USB commands, aka Bug ID CSCux10531.",Cisco,Firepower Extensible Operating System,,,0.0004400000034365803,false,,false,false,false,,,false,false,,2015-11-19T02:00:00.000Z,0 CVE-2015-6371,https://securityvulnerability.io/vulnerability/CVE-2015-6371,,"Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows remote authenticated users to read arbitrary files via crafted parameters to unspecified scripts, aka Bug ID CSCux10621.",Cisco,Firepower Extensible Operating System,,,0.0010600000387057662,false,,false,false,false,,,false,false,,2015-11-19T02:00:00.000Z,0 CVE-2015-6374,https://securityvulnerability.io/vulnerability/CVE-2015-6374,,"The web interface in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, aka Bug ID CSCux10604.",Cisco,Firepower Extensible Operating System,,,0.0015200000489130616,false,,false,false,false,,,false,false,,2015-11-19T02:00:00.000Z,0 CVE-2015-6368,https://securityvulnerability.io/vulnerability/CVE-2015-6368,,"Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows remote attackers to read files via a crafted HTTP request, aka Bug ID CSCux10608.",Cisco,Firepower Extensible Operating System,,,0.001069999998435378,false,,false,false,false,,,false,false,,2015-11-19T02:00:00.000Z,0 CVE-2015-6370,https://securityvulnerability.io/vulnerability/CVE-2015-6370,,"The Management I/O (MIO) component in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows local users to execute arbitrary OS commands as root via crafted CLI input, aka Bug ID CSCux10578.",Cisco,Firepower Extensible Operating System,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-11-19T02:00:00.000Z,0 CVE-2015-6373,https://securityvulnerability.io/vulnerability/CVE-2015-6373,,"Cross-site request forgery (CSRF) vulnerability in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCux10611.",Cisco,Firepower Extensible Operating System,,,0.0010900000343099236,false,,false,false,false,,,false,false,,2015-11-18T15:00:00.000Z,0 CVE-2015-6372,https://securityvulnerability.io/vulnerability/CVE-2015-6372,,"Cross-site scripting (XSS) vulnerability in the web-based management interface in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCux10614.",Cisco,Firepower Extensible Operating System,,,0.002859999891370535,false,,false,false,false,,,false,false,,2015-11-18T15:00:00.000Z,0 CVE-2015-4287,https://securityvulnerability.io/vulnerability/CVE-2015-4287,,"Cisco Firepower Extensible Operating System 1.1(1.86) on Firepower 9000 devices allows remote attackers to bypass intended access restrictions and obtain sensitive device information by visiting an unspecified web page, aka Bug ID CSCuu82230.",Cisco,Firepower Extensible Operating System,,,0.002420000033453107,false,,false,false,false,,,false,false,,2015-07-29T01:00:00.000Z,0