Vulnslist

find the latest Cisco vulnerabilities

Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability

cisco-sa-20161207-wsa1 · Medium · Published · Updated

A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. The vulnerability is due to incomplete input validation of HTTP headers. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to connect to a website that should be blocked. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-9212
Cisco Bug IDsCSCvb49012, CSCvg22495
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
Product Names From Source
Cisco Web Security Appliance (WSA), Cisco Secure Web Appliance

Related Products

Product CVE Evidence
Cisco Web Security Appliance (WSA) CVE-2016-9212 Cisco OpenVuln
Cisco Secure Web Appliance CVE-2016-9212 Cisco OpenVuln