Cisco Web Security Appliance FTP Authentication Bypass Vulnerability

Medium Nessus Plugin ID 108404


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the remote Cisco Web Security Appliance (WSA) device is affected by a FTP authentication bypass vulnerability, due to inccorect validation of credentials. A remote attacker could potentially log into the FTP server without a valid password.


Upgrade to the relevant fixed version 10.5.2-042.

See Also

Plugin Details

Severity: Medium

ID: 108404

File Name: cisco-sa-20180307-wsa.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 2018/03/16

Updated: 2019/11/08

Dependencies: 69081

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-0087

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:web_security_appliance

Required KB Items: Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion, Host/AsyncOS/Cisco Web Security Appliance/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 2018/03/07

Vulnerability Publication Date: 2018/03/07

Reference Information

CVE: CVE-2018-0087

BID: 103407


CISCO-SA: cisco-sa-20180307-wsa