CVE-2024-20424
📋 TL;DR
This vulnerability allows authenticated attackers with at least Security Analyst (Read Only) privileges to execute arbitrary commands as root on Cisco Secure Firewall Management Center devices. It affects Cisco FMC software due to insufficient HTTP request validation. Attackers could also execute commands on managed Firepower Threat Defense devices through the compromised FMC.
💻 Affected Systems
- Cisco Secure Firewall Management Center (formerly Firepower Management Center)
📦 What is this software?
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
Secure Firewall Management Center by Cisco
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the FMC device and all managed FTD devices, allowing attackers to disable security controls, exfiltrate sensitive data, pivot to internal networks, and establish persistent backdoors.
Likely Case
Attackers with valid credentials (including compromised accounts) gain full control of the FMC device, potentially modifying firewall rules, disabling security policies, and accessing sensitive network information.
If Mitigated
With proper network segmentation, strong authentication controls, and limited privileged accounts, impact is contained to the FMC management network segment.
🎯 Exploit Status
Exploitation requires valid credentials but is straightforward once authenticated. The vulnerability is in the web interface, making it accessible to attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.4.1 and later fixed versions
Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download appropriate fixed version from Cisco Software Center. 3. Follow Cisco upgrade procedures for FMC. 4. Verify upgrade completion and functionality.
🔧 Temporary Workarounds
Restrict Management Access
allLimit access to the FMC web interface to trusted IP addresses only using network ACLs or firewall rules.
Implement Strong Authentication Controls
allEnforce multi-factor authentication, strong password policies, and regular credential rotation for all FMC user accounts.
🧯 If You Can't Patch
- Isolate FMC management interface to dedicated VLAN with strict access controls
- Implement network monitoring for unusual HTTP requests to FMC interface
🔍 How to Verify
Check if Vulnerable:
Check FMC software version via web interface (System > Updates) or CLI command 'show version'
Check Version:
show version | include Version
Verify Fix Applied:
Verify version is 7.4.1 or later fixed version and check Cisco advisory for specific fixed releases
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to FMC web interface
- Unexpected command execution logs
- Authentication from unusual IP addresses
Network Indicators:
- HTTP POST requests with unusual parameters to FMC management interface
- Outbound connections from FMC to unexpected destinations
SIEM Query:
source="fmc.logs" AND (http_method="POST" AND (uri_contains("/api/") OR param_contains("command")))