Cisco Firepower System Software FTP Malware Vulnerability

cisco-sa-20161116-fss · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the FTP Representational State Transfer Application Programming Interface (REST API) for Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass FTP malware detection rules and download malware over an FTP connection. The vulnerability is due to a lack of continuity between the FTP control and data connection when the malware is detected. An attacker could exploit this vulnerability by repeatedly attempting to download FTP malware. An exploit could allow the attacker to bypass the configured FTP malware blocking rules. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-fss

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-6460
Cisco Bug IDsCSCuv36188 , CSCuy91156
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C

Products with public affected evidence