Traffic Monitoring Circumvention in Cisco Web Security Appliance
CVE-2018-0353

7.5HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
7 June 2018

Summary

A vulnerability in the traffic-monitoring capabilities of Cisco Web Security Appliance (WSA) allows an unauthenticated remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) protections. This issue arises from modifications in the underlying operating system which handles traffic monitoring. Attackers can exploit this by sending meticulously crafted IP packets to the WSA. Once exploited, the device may erroneously allow traffic that it was intended to block, affecting both IPv4 and IPv6 traffic. This vulnerability specifically targets Cisco AsyncOS versions 10.5.1, 10.5.2, and 11.0.0 on both virtual and hardware appliances when configured for L4TM.

Affected Version(s)

Cisco Web Security Appliance unknown Cisco Web Security Appliance unknown

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.