{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T01:16:31.735","vulnerabilities":[{"cve":{"id":"CVE-2024-20275","sourceIdentifier":"psirt@cisco.com","published":"2024-10-23T17:15:15.237","lastModified":"2025-08-05T14:46:01.110","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the cluster backup feature of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient validation of user data that is supplied through the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary operating system commands on the affected device. To exploit this vulnerability, an attacker would need valid credentials for a user account with at least the role of Network Administrator. In addition, the attacker would need to persuade a legitimate user to initiate a cluster backup on the affected device."},{"lang":"es","value":"Una vulnerabilidad en la función de copia de seguridad de clúster del software Cisco Secure Firewall Management Center (FMC), anteriormente Firepower Management Center Software, podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema operativo subyacente. Esta vulnerabilidad se debe a una validación insuficiente de los datos de usuario que se suministran a través de la interfaz de administración basada en web. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un dispositivo afectado. Una explotación exitosa podría permitir al atacante ejecutar comandos arbitrarios del sistema operativo en el dispositivo afectado. Para aprovechar esta vulnerabilidad, un atacante necesitaría credenciales válidas para una cuenta de usuario con al menos el rol de administrador de red. Además, el atacante necesitaría persuadir a un usuario legítimo para que inicie una copia de seguridad de clúster en el dispositivo afectado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*","matchCriteriaId":"A58A2DA5-3EE7-408D-AAFA-82330F0325B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"F4C51EE7-866B-410C-B75E-EF260D5062B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*","matchCriteriaId":"FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"AD1E4527-AAE2-4DA9-AFDA-6375839F7843"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*","matchCriteriaId":"2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*","matchCriteriaId":"2ED03874-4071-4382-8A46-8B3A59E601FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*","matchCriteriaId":"BF84E043-DF3C-4A95-8FDA-B0FDCD795377"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B9498087-9642-4A86-B3EE-1513C55A86E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*","matchCriteriaId":"36C229AB-2851-48D4-815A-63AAB4462A24"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*","matchCriteriaId":"6DA4BCFC-8237-4F5C-9863-523EE7D8619B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*","matchCriteriaId":"07693A92-7D84-45A1-ACD6-D83AE41D504B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"2C78050A-A5FB-427B-BF0D-0353B240A4FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*","matchCriteriaId":"85E76AE7-12AC-4419-AE66-43730B173B4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*","matchCriteriaId":"5D401072-6709-4921-8918-720F28D61E24"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*","matchCriteriaId":"C0EA3467-4205-4C41-AF24-689330F7396B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"9BE94E38-5F29-4AE1-8129-7F7582C2CC75"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"D6BD1665-7824-4D98-A930-432CBDA4EAD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*","matchCriteriaId":"F8056E69-22FA-4935-A576-916805D90C62"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO","source":"psirt@cisco.com","tags":["Broken Link"]},{"url":"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}