Lucene search

K
cvelistCiscoCVELIST:CVE-2021-34749
HistoryAug 18, 2021 - 7:40 p.m.

CVE-2021-34749 Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability

2021-08-1819:40:38
CWE-200
cisco
www.cve.org
7
cisco
vulnerability
data exfiltration
ssl handshake
command-and-control
snort
filtering technology

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

8.8

Confidence

High

EPSS

0.003

Percentile

65.6%

A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Web Security Appliance (WSA)",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

8.8

Confidence

High

EPSS

0.003

Percentile

65.6%