CVE-2024-20472

6.5 MEDIUM

📋 TL;DR

An authenticated SQL injection vulnerability in Cisco Secure Firewall Management Center (FMC) web interface allows administrators to execute arbitrary SQL queries. This could lead to unauthorized data access or system modifications. Only systems running vulnerable FMC software with administrator accounts are affected.

💻 Affected Systems

Products:
  • Cisco Secure Firewall Management Center (FMC)
Versions: Multiple versions prior to 7.4.1
Operating Systems: Cisco FMC appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication. All default configurations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator could exfiltrate all configuration data, modify firewall rules to allow unauthorized traffic, or compromise the entire management system.

🟠

Likely Case

Administrator with malicious intent could extract sensitive configuration data or modify limited system settings.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrators who would be detected if misusing privileges.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq

Restart Required: Yes

Instructions:

1. Backup FMC configuration. 2. Download and install FMC version 7.4.1 or later from Cisco Software Center. 3. Reboot the FMC appliance after installation.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to only trusted personnel and implement multi-factor authentication.

Network Segmentation

all

Restrict access to FMC management interface to only authorized management networks.

🧯 If You Can't Patch

  • Implement strict monitoring of administrator account activity and SQL query patterns
  • Apply network controls to limit FMC interface access to only necessary administrative workstations

🔍 How to Verify

Check if Vulnerable:

Check FMC version via web interface: System > Updates > Version Information

Check Version:

ssh admin@fmc-hostname show version

Verify Fix Applied:

Verify version is 7.4.1 or later in System > Updates > Version Information

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in FMC logs
  • Multiple failed authentication attempts followed by successful admin login
  • Configuration changes from unexpected administrator accounts

Network Indicators:

  • Unusual database connection patterns from FMC
  • Unexpected outbound data transfers from FMC management interface

SIEM Query:

source="fmc_logs" AND (sql_query OR database_query) AND admin_user=*

🔗 References

📤 Share & Export