Lucene search

K
cveCiscoCVE-2021-34698
HistoryOct 06, 2021 - 8:15 p.m.

CVE-2021-34698

2021-10-0620:15:08
CWE-401
cisco
web.nvd.nist.gov
41
cve-2021-34698
cisco
wsa
proxy service
vulnerability
dos
memory exhaustion
nvd
cybersecurity

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.002

Percentile

52.6%

A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.

Affected configurations

Nvd
Node
ciscoasyncosRange12.012.0.3-005
OR
ciscoasyncosRange12.512.5.2-007
OR
ciscoasyncosRange14.014.0.1-014
AND
ciscoweb_security_appliance_s170Match-
OR
ciscoweb_security_appliance_s190Match-
OR
ciscoweb_security_appliance_s380Match-
OR
ciscoweb_security_appliance_s390Match-
OR
ciscoweb_security_appliance_s680Match-
OR
ciscoweb_security_appliance_s690Match-
OR
ciscoweb_security_appliance_s690xMatch-
VendorProductVersionCPE
ciscoasyncos*cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
ciscoweb_security_appliance_s170-cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s190-cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s380-cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s390-cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s680-cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s690-cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s690x-cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco Web Security Appliance (WSA)",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.002

Percentile

52.6%

Related for CVE-2021-34698