Cisco fixes critical flaw in network management platform
The latest security hole is patched just days before the firm’s flagship Cisco Live 2020 conference
Cisco has urged its customers to update their Firepower Management Center (FMC) after patching a critical vulnerability that could have given attackers administrative privileges on affected devices.
Dubbed CVE-2019-16028, the vulnerability has been found in the firm’s platform for managing its network security products, including firewalls or malware protection. It has been given a CVE rating of 9.8, meaning it has been branded as ‘critical’
RELATED RESOURCE
How targeted simulations differ from penetration tests and vulnerability scanning
Stay one step ahead of cyber attackers
“The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server,” an advisory from the company said.
“An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.
“The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.”
The flaw affects numerous versions of FMC, including several that have reached end-of-life, namely 6.1.0, 6.2.0, 6.2.1, and 6.2.2. Cisco has advised businesses using these iterations to upgrade to a release that integrates the fix before patching, such as versions 6.2.3, 6.3.0, 6.4.0, or 6.5.0.
The networking giant’s latest security issue has arisen just days before the firm is set to host its flagship Cisco Live 2020 conference in Barcelona.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The company has endured a topsy-turvy 2019, with a spate of security issues and negative headlines affecting its fortunes. For example, in August last year, three major vulnerabilities were found in the most popular switches used by its small and medium-sized business (SMB) customers.
This is in addition to its WebEx and Zoom platforms being hit with the ‘prying eye’ flaw in October, that would allow an attacker to use an enumeration attack to find open calls or meetings, if successfully exploited.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Google Cloud is more confident than ever in its AI strength, from hardware to softwareOpinion With a commitment to interoperability and open data connections, Google Cloud is daring its customers to find a more comprehensive AI suite on the market
-
Node4 names new CEO and chair in double leadership swoopNews Neil Muller joins the business as chief executive officer, while Patrick De Smedt has been named non-executive chair.
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.