Cisco Web Security Appliance HTTPS Packet Processing DoS (cisco-sa-20160302-wsa)

medium Nessus Plugin ID 89785

Synopsis

The remote security appliance is affected by a denial of service vulnerability.

Description

According to its self-reported version, the remote Cisco Web Security Appliance (WSA) is affected by a denial of service vulnerability in the web proxy framework due to improper processing of HTTPS packets.
An unauthenticated, remote attacker can exploit this vulnerability, via a malformed HTTPS request packet, to cause all requests traversing the WSA to be dropped, resulting in a denial of service condition.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCuu24840.

See Also

http://www.nessus.org/u?c99dc6df

Plugin Details

Severity: Medium

ID: 89785

File Name: cisco-sa-20160302-wsa.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 3/9/2016

Updated: 5/14/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2016-1288

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:web_security_appliance, cpe:/a:cisco:web_security_appliance, cpe:/o:cisco:web_security_appliance, cpe:/o:cisco:asyncos

Required KB Items: Settings/ParanoidReport, Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion, Host/AsyncOS/Cisco Web Security Appliance/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2016

Vulnerability Publication Date: 3/2/2016

Reference Information

CVE: CVE-2016-1288

BID: 83936

CISCO-SA: cisco-sa-20160302-wsa

CISCO-BUG-ID: CSCuu24840