| Vulnerability Name: | CVE-2016-9212 (CCN-119669) | ||||||||||||
| Assigned: | 2016-12-07 | ||||||||||||
| Published: | 2016-12-07 | ||||||||||||
| Updated: | 2016-12-22 | ||||||||||||
| Summary: | A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-9212 Source: CCN Type: SECTRACK ID: 1037410 Cisco Web Security Appliance Input Validation Flaw in 'Decrypt for End-User Notification' Parameter Lets Remote Users Bypass Security Restrictions on the Target System Source: BID Type: Third Party Advisory, VDB Entry 94774 Source: CCN Type: BID-94774 Cisco Web Security Appliance CVE-2016-9212 Remote Security Bypass Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1037410 Source: XF Type: UNKNOWN cisco-cve20169212-sec-bypass(119669) Source: CCN Type: Cisco Security Advisory cisco-sa-20161207-wsa1 Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability Source: CONFIRM Type: Vendor Advisory https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||