This is an advisory on a vulnerability found in Cisco Firepower Management Center. Malicious people can exploit the vulnerability to bypass security restrictions.
It is reported that a file policy restriction in the Cisco FireSIGHT System Software “Block upload with reset” is vulnerable to bypassing by an attacker due to a vulnerability found in the Detection engine of Cisco FireSIGHT System Software.
During internal security testing, a vulnerability was detected could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP. The vulnerability exists because the affected software incorrectly handles FTP control connections. An attacker could exploit this vulnerability by sending a maliciously crafted FTP connection to transfer a file to an affected device. A successful exploit could allow the attacker to bypass a file policy that is configured to apply the Block upload with reset action to FTP traffic.
Cisco Firepower Management Center (formerly Cisco FireSIGHT Management Center) The vulnerability is reported in versions 220.127.116.11, 6.2.3, and 6.3.0.
Please contact the vendor for details about an update as the bug report CSCvh70130 indicates a fixed status, however, not in all cases appropriate fixed versions are mentioned.
If you think you are a victim of a cyber-security attack. Immediately send an email to firstname.lastname@example.org for a rapid response.