Lucene search

K
nvd[email protected]NVD:CVE-2021-34698
HistoryOct 06, 2021 - 8:15 p.m.

CVE-2021-34698

2021-10-0620:15:08
CWE-401
web.nvd.nist.gov
23
cisco
asyncos
wsa
denial of service
memory exhaustion

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

52.6%

A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.

Affected configurations

Nvd
Node
ciscoasyncosRange12.012.0.3-005
OR
ciscoasyncosRange12.512.5.2-007
OR
ciscoasyncosRange14.014.0.1-014
AND
ciscoweb_security_appliance_s170Match-
OR
ciscoweb_security_appliance_s190Match-
OR
ciscoweb_security_appliance_s380Match-
OR
ciscoweb_security_appliance_s390Match-
OR
ciscoweb_security_appliance_s680Match-
OR
ciscoweb_security_appliance_s690Match-
OR
ciscoweb_security_appliance_s690xMatch-
VendorProductVersionCPE
ciscoasyncos*cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
ciscoweb_security_appliance_s170-cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s190-cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s380-cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s390-cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s680-cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s690-cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_s690x-cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

52.6%

Related for NVD:CVE-2021-34698