CVE-2024-20412
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
23/10/2024
Last modified:
05/11/2024
Description
A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials.<br />
<br />
This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device.
Impact
Base Score 3.x
8.40
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



