// For flags

CVE-2019-1982

Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.

Una vulnerabilidad en el componente de filtrado de tráfico HTTP del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido al manejo inapropiado de las peticiones HTTP, incluidas las comunicadas por medio de una conexión HTTPS segura, que contienen encabezados especialmente diseñados con fines maliciosos. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones maliciosas a un dispositivo afectado. Una explotación podría permitir al atacante evitar el filtrado y entregar peticiones maliciosas hacia los sistemas protegidos, lo que permitiría a atacantes entregar contenido malicioso que de otra manera se bloquearía.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-11-05 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-11-19 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.13
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.13"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.14.0
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.14.0"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
3.0.0
Search vendor "Cisco" for product "Firepower Management Center" and version "3.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Services Software For Asa
Search vendor "Cisco" for product "Firepower Services Software For Asa"
--
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
--
Affected