Lucene search

K
ciscoCiscoCISCO-SA-20150410-CVE-2015-0692
HistoryApr 10, 2015 - 5:41 p.m.

Cisco Web Security Appliance Pickle Python Module Arbitrary Code Execution Vulnerability

2015-04-1017:41:57
tools.cisco.com
17

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the status checking process of support remote access tunnels in the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to execute arbitrary Python code on a targeted system.

The vulnerability is due to improper use and handling of the pickle Python module by the affected software. An attacker could exploit this vulnerability by submitting crafted serialized objects to a targeted device. A successful exploit could be used to conduct further attacks.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit the vulnerability, the attacker must log in locally to the vulnerability device. The access requirement reduces the potential for exploitation.

Affected configurations

Vulners
Node
ciscoweb_security_appliance_\(wsa\)Matchany
OR
ciscoweb_security_appliance_\(wsa\)Matchany
VendorProductVersionCPE
ciscoweb_security_appliance_\(wsa\)anycpe:2.3:a:cisco:web_security_appliance_\(wsa\):any:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20150410-CVE-2015-0692