Vulnerability Details CVE-2021-34761
A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.5%
CVSS Severity
CVSS v3 Score 4.4
CVSS v2 Score 6.6
Products affected by CVE-2021-34761
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.4.0
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.1
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.7.0
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.0.0
-
cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.1.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.4
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2
-
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0
-
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1
-
cpe:2.3:a:cisco:sourcefire_defense_center:6.2.3
-
cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0
-
cpe:2.3:a:cisco:sourcefire_defense_center:6.6.1
-
cpe:2.3:a:cisco:sourcefire_defense_center:6.7.0
-
cpe:2.3:a:cisco:sourcefire_defense_center:7.0.0
-
cpe:2.3:a:cisco:sourcefire_defense_center:7.1.0