Vulnslist

find the latest Cisco vulnerabilities

Cisco Web Security Appliance Pickle Python Module Arbitrary Code Execution Vulnerability

Cisco-SA-20150410-CVE-2015-0692 · Medium · Published · Updated

A vulnerability in the status checking process of support remote access tunnels in the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to execute arbitrary Python code on a targeted system.   The vulnerability is due to improper use and handling of the pickle Python module by the affected software. An attacker could exploit this vulnerability by submitting crafted serialized objects to a targeted device. A successful exploit could be used to conduct further attacks. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit the vulnerability, the attacker must log in locally to the vulnerability device. The access requirement reduces the potential for exploitation.

Workarounds

Administrators are advised to apply the appropriate updates as they become available.

Administrators are advised to allow only trusted users to access local systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0692
Cisco Bug IDsNA
CVSS ScoreBase 6.6
Base 6.6 AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C
Product Names From Source
Cisco Web Security Appliance (WSA), Cisco Secure Web Appliance

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2015-0692 Cisco OpenVuln
Cisco Web Security Appliance (WSA) CVE-2015-0692 Cisco OpenVuln
Cisco Secure Web Appliance CVE-2015-0692 Cisco OpenVuln