CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
54.8%
A vulnerability in the web framework of Cisco AsyncOS could allow an unauthenticated, remote attacker to inject a crafted HTTP header that could cause a web page redirection to a malicious website.
The vulnerability is due to insufficient validation of user input before it is used as an HTTP header value. An attacker could exploit this vulnerability by persuading a user to access a crafted URL.
This vulnerability was reported to Cisco by Glafkos Charalambous.
Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.
Cisco has confirmed the vulnerability in a security notice and released software updates.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.
Cisco indicates through the CVSS score that functional exploit code exists. Proof-of-concept exploit code is publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | web_security_appliance_\(wsa\) | any | cpe:2.3:a:cisco:web_security_appliance_\(wsa\):any:*:*:*:*:*:*:* |
cisco | email_security_appliance | any | cpe:2.3:h:cisco:email_security_appliance:any:*:*:*:*:*:*:* |
cisco | content_security_management_appliance | any | cpe:2.3:h:cisco:content_security_management_appliance:any:*:*:*:*:*:*:* |