Vulnerability Name:

CVE-2015-0693 (CCN-102205)

Assigned:2015-04-10
Published:2015-04-10
Updated:2017-01-06
Summary:Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via a crafted pickle file, aka Bug ID CSCut39259.
CVSS v3 Severity:7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.6 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C)
4.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2015-0693

Source: CCN
Type: Cisco Vulnerability Alert 38306
Cisco Web Security Appliance Python File Processing Privilege Escalation Vulnerability

Source: CISCO
Type: Vendor Advisory
20150413 Cisco Web Security Appliance Python File Processing Privilege Escalation Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1032097

Source: XF
Type: UNKNOWN
cisco-web-cve20150693-priv-esc(102205)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cisco:web_security_appliance:8.5_base:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:web_security_appliance:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco web security appliance 8.5_base
    cisco web security appliance *