Vulnerability Name:

CVE-2016-9212 (CCN-119669)

Assigned:2016-12-07
Published:2016-12-07
Updated:2016-12-22
Summary:A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2016-9212

Source: CCN
Type: SECTRACK ID: 1037410
Cisco Web Security Appliance Input Validation Flaw in 'Decrypt for End-User Notification' Parameter Lets Remote Users Bypass Security Restrictions on the Target System

Source: BID
Type: Third Party Advisory, VDB Entry
94774

Source: CCN
Type: BID-94774
Cisco Web Security Appliance CVE-2016-9212 Remote Security Bypass Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1037410

Source: XF
Type: UNKNOWN
cisco-cve20169212-sec-bypass(119669)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20161207-wsa1
Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability

Source: CONFIRM
Type: Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:web_security_appliance:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco web security appliance 9.0.1-162
    cisco web security appliance 9.1.1-074
    cisco web security appliance *