
CVE-2021-1518 – Cisco Firepower Device Manager On-Box Software Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-1518
22 Jul 2021 — A vulnerability in the REST API of Cisco Firepower Device Manager (FDM) On-Box Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. This vulnerability is due to insufficient sanitization of user input on specific REST API commands. An attacker could exploit this vulnerability by sending a crafted HTTP request to the API subsystem of an affected device. A successful exploit could allow the attacker to execute arbitrary code... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-rce-Rx6vVurq • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2020-3310 – Cisco Firepower Device Manager On-Box Software XML Parsing Vulnerability
https://notcve.org/view.php?id=CVE-2020-3310
06 May 2020 — A vulnerability in the XML parser code of Cisco Firepower Device Manager On-Box software could allow an authenticated, remote attacker to cause an affected system to become unstable or reload. The vulnerability is due to insufficient hardening of the XML parser configuration. An attacker could exploit this vulnerability in multiple ways using a malicious file: An attacker with administrative privileges could upload a malicious XML file on the system and cause the XML code to parse the malicious file. An att... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xpftd-gYDXyN8H • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2020-3309 – Cisco Firepower Device Manager On-Box Software Arbitrary File Overwrite Vulnerability
https://notcve.org/view.php?id=CVE-2020-3309
06 May 2020 — A vulnerability in Cisco Firepower Device Manager (FDM) On-Box software could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by uploading a malicious file to an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on as well as modify the underlying operating system of an affected device. Una... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdmfo-HvPWKxDe • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •