CVE-2016-6433
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
06/10/2016
Last modified:
12/04/2025
Description
The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc
- http://www.securityfocus.com/bid/93414
- https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking
- https://www.exploit-db.com/exploits/40463/
- https://www.exploit-db.com/exploits/41041/
- https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt
- http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc
- http://www.securityfocus.com/bid/93414
- https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking
- https://www.exploit-db.com/exploits/40463/
- https://www.exploit-db.com/exploits/41041/
- https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt



