CVE-2024-20379

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to read arbitrary files from the underlying operating system of Cisco Secure Firewall Management Center (FMC) Software. Attackers need valid user credentials to exploit this path traversal vulnerability. Organizations using affected Cisco FMC versions are at risk.

💻 Affected Systems

Products:
  • Cisco Secure Firewall Management Center (FMC) Software
Versions: Multiple versions prior to 7.4.1.2 and 7.6.0.1
Operating Systems: Cisco FMC appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Formerly known as Firepower Management Center Software. Requires authenticated access to the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or credential files, potentially leading to full system compromise or lateral movement within the network.

🟠

Likely Case

Attackers with valid credentials could read configuration files, logs, or other sensitive data to gather intelligence for further attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to unauthorized file reads that could be detected and contained.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is a path traversal issue in the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1.2 and 7.6.0.1

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patch from Cisco Software Center. 3. Apply patch following Cisco upgrade procedures. 4. Restart the FMC appliance.

🔧 Temporary Workarounds

Restrict Access to Management Interface

all

Limit access to the FMC web interface to trusted IP addresses only

Configure firewall rules to restrict access to FMC management IP/port

Implement Strong Authentication Controls

all

Enforce multi-factor authentication and strong password policies for FMC users

Configure MFA in FMC user management settings

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FMC from untrusted networks
  • Enhance monitoring of FMC access logs for suspicious file read attempts

🔍 How to Verify

Check if Vulnerable:

Check FMC software version via web interface: System > Updates > Version Information

Check Version:

ssh admin@fmc-host 'show version' or check web interface

Verify Fix Applied:

Verify version is 7.4.1.2 or 7.6.0.1 or later after patching

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in FMC logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • HTTP requests with path traversal patterns to FMC management interface

SIEM Query:

source="fmc_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export