SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Web Security Appliance Vendors:   Cisco
Cisco Web Security Appliance Certificate Generation Input Validation Flaw Lets Remote Authenticated Users Execute Arbitrary Commands on the Target System
SecurityTracker Alert ID:  1034059
SecurityTracker URL:  http://securitytracker.com/id/1034059
CVE Reference:   CVE-2015-6298   (Links to External Site)
Date:  Nov 4 2015
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.0 and after
Description:   A vulnerability was reported in Cisco Web Security Appliance. A remote authenticated user can execute arbitrary commands on the target system.

A remote authenticated user can supply specially crafted argument values to exploit an input validation flaw in the certificate generation process in the admin web interface and execute arbitrary commands on the target system with root privileges.

The vendor has assigned bug ID CSCus83445 to this vulnerability.

Impact:   A remote authenticated user can execute arbitrary commands on the target system with root privileges.
Solution:   The vendor has issued a fix (8.0.8-113, 8.5.3-051, 8.7.0-171-LD, 8.8.0-085).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC