This is an advisory on a vulnerability found in Cisco Firepower Management Center which can be exploited to bypass a configured URL-based access control policy.
An error within the detection engine when handling TCP packets can be exploited to bypass a configured URL-based access control policy.
The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device.
Cisco Firepower Management Center Software (formerly Cisco FireSIGHT Management Center) Versions 6.0.0, 6.1.0, 6.2.0, 6.2.1, and 6.2.2.
The vulnerability is reported in the versions 6.0.0, 6.1.0, 6.2.0, 6.2.1, and 6.2.2.
Users are recommended to update their Cisco FirePower Management Software to version 220.127.116.11 or 6.2.3.
If you think you are a victim of a cyber-security attack. Immediately send an email to firstname.lastname@example.org for a rapid response.