CVE-2021-34751

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated low-privilege users to view sensitive configuration information in clear text through Cisco Firepower Management Center's web GUI. It affects Cisco FMC Software due to improper encryption of stored sensitive data. Attackers with valid credentials can access configuration parameters that should be protected.

💻 Affected Systems

Products:
  • Cisco Firepower Management Center (FMC) Software
Versions: Multiple versions prior to fixes released in October 2021
Operating Systems: Cisco FMC appliance software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web-based GUI configuration manager specifically. Requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive network configuration details, firewall rules, authentication credentials, or other protected information that could facilitate further attacks or network compromise.

🟠

Likely Case

Authorized but low-privileged users or compromised accounts access configuration details they shouldn't see, potentially learning about network architecture or security controls.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: MEDIUM - Requires authentication but exposed web interfaces increase attack surface.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials and GUI access. Attack involves navigating to specific configuration sections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions. 2. Download and apply appropriate software update from Cisco. 3. Restart FMC services or appliance as required.

🔧 Temporary Workarounds

No workarounds available

all

Cisco states there are no workarounds that address this vulnerability

🧯 If You Can't Patch

  • Restrict access to FMC GUI to only authorized administrators using network segmentation
  • Implement strict credential management and monitoring for FMC access

🔍 How to Verify

Check if Vulnerable:

Check FMC software version against affected versions listed in Cisco advisory

Check Version:

From FMC CLI: 'show version' or check via GUI under System > Updates

Verify Fix Applied:

Verify FMC software version is updated to fixed version listed in Cisco advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to configuration sections
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unauthorized access to FMC web interface from unexpected sources

SIEM Query:

source="fmc.logs" AND (event_type="configuration_access" OR user_privilege="low") AND resource="sensitive_config"

🔗 References

📤 Share & Export