Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Embedded Server/Appliance)  >   Cisco Web Security Appliance Vendors:   Cisco
Cisco Web Security Appliance Traffic Monitoring Bug Lets Remote Users Bypass Layer 4 Access Restrictions on the Target System
SecurityTracker Alert ID:  1041081
SecurityTracker URL:
CVE Reference:   CVE-2018-0353   (Links to External Site)
Date:  Jun 12 2018
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco Web Security Appliance. A remote user can bypass security controls on the target system.

A remote user can send specially crafted IP packets to the target device to exploit a flaw in the traffic-monitoring function and bypass Layer 4 Traffic Monitor (L4TM) functions on the target system, sending packets through the target device.

Cisco AsyncOS versions running WSA software 10.5.1, 10.5.2, and 11.0.0 are affected.

The vendor has assigned bug ID CSCvg78875 to this vulnerability.

Impact:   A remote user can bypass layer 4 access controls on the target system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC