CVE-2024-20275

6.1 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers with Network Administrator privileges to execute arbitrary operating system commands on Cisco Secure Firewall Management Center devices. Attackers must trick a legitimate user into initiating a cluster backup to exploit the insufficient input validation in the web interface. Organizations using affected FMC versions are at risk.

💻 Affected Systems

Products:
  • Cisco Secure Firewall Management Center (FMC)
  • Firepower Management Center
Versions: Multiple versions prior to 7.4.1.2
Operating Systems: Cisco FMC OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Network Administrator role credentials and user interaction to initiate cluster backup.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands, potentially leading to data exfiltration, lateral movement, or complete device takeover.

🟠

Likely Case

Privilege escalation leading to unauthorized configuration changes, data access, or persistence mechanisms being installed.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with Network Administrator privileges and social engineering to trigger the vulnerable feature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1.2 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install FMC version 7.4.1.2 or later from Cisco Software Center. 3. Apply the update through the web interface. 4. Verify successful installation and functionality.

🔧 Temporary Workarounds

Restrict Network Administrator Access

all

Limit the number of users with Network Administrator privileges to only those who absolutely require them.

Implement Network Segmentation

all

Isolate FMC management interfaces from general user networks to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual backup initiation activities
  • Deploy network-based intrusion detection systems to monitor for command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check FMC version via web interface: System > Updates > Version Information. If version is earlier than 7.4.1.2, device is vulnerable.

Check Version:

Via FMC CLI: show version | include Version

Verify Fix Applied:

Confirm version is 7.4.1.2 or later and test cluster backup functionality to ensure it works without issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cluster backup initiation patterns
  • Multiple failed authentication attempts followed by backup requests
  • Commands with unusual parameters in backup-related logs

Network Indicators:

  • HTTP requests to backup endpoints with suspicious parameters
  • Unusual outbound connections from FMC device following backup operations

SIEM Query:

source="fmc_logs" AND (event_type="backup_initiated" AND user NOT IN ["expected_users"]) OR (event_type="command_execution" AND process="backup")

🔗 References

📤 Share & Export