Cisco Web Security Appliance FTP Authentication Bypass Vulnerability

medium Nessus Plugin ID 108404

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the remote Cisco Web Security Appliance (WSA) device is affected by a FTP authentication bypass vulnerability, due to inccorect validation of credentials. A remote attacker could potentially log into the FTP server without a valid password.

Solution

Upgrade to the relevant fixed version 10.5.2-042.

See Also

http://www.nessus.org/u?e607a8a1

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf74281

Plugin Details

Severity: Medium

ID: 108404

File Name: cisco-sa-20180307-wsa.nasl

Version: 1.11

Type: local

Family: CISCO

Published: 3/16/2018

Updated: 5/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-0087

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:web_security_appliance, cpe:/a:cisco:web_security_appliance, cpe:/o:cisco:web_security_appliance, cpe:/o:cisco:asyncos

Required KB Items: Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion, Host/AsyncOS/Cisco Web Security Appliance/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/7/2018

Vulnerability Publication Date: 3/7/2018

Reference Information

CVE: CVE-2018-0087

BID: 103407

CISCO-SA: cisco-sa-20180307-wsa

CISCO-BUG-ID: CSCvf74281