CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
47.5%
A vulnerability in AsyncOS for the Cisco Web Security Appliance (WSA) could
allow an unauthenticated, local attacker to log in to the device with the privileges of a limited user or an
unauthenticated, remote attacker to authenticate to certain areas of the web GUI.
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/h:cisco:web_security_appliance";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.106974");
script_cve_id("CVE-2017-6750");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_version("2023-07-25T05:05:58+0000");
script_name("Cisco Web Security Appliance Static Credentials Vulnerability");
script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa4");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"summary", value:"A vulnerability in AsyncOS for the Cisco Web Security Appliance (WSA) could
allow an unauthenticated, local attacker to log in to the device with the privileges of a limited user or an
unauthenticated, remote attacker to authenticate to certain areas of the web GUI.");
script_tag(name:"insight", value:"The vulnerability is due to a user account that has a default and static
password. An attacker could exploit this vulnerability by connecting to the affected system using this default
account.");
script_tag(name:"impact", value:"An exploit could allow the attacker to log in with the default credentials,
allowing the attacker to view the system's serial number by using the CLI or to download reports by using the web
interface.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_tag(name:"creation_date", value:"2017-07-20 14:43:16 +0700 (Thu, 20 Jul 2017)");
script_category(ACT_GATHER_INFO);
script_family("CISCO");
script_copyright("Copyright (C) 2017 Greenbone AG");
script_dependencies("gb_cisco_wsa_version.nasl");
script_mandatory_keys("cisco_wsa/installed");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!version = get_app_version(cpe:CPE))
exit(0);
affected = make_list(
'10.0.0-232',
'10.0.0-233',
'10.1.0',
'10.1.0-204',
'10.1.1-230',
'10.1.1-234',
'10.1.1-235',
'10.5.0',
'10.5.0-358');
foreach af (affected) {
if (version == af) {
report = report_fixed_ver(installed_version: version, fixed_version: "See advisory");
security_message(port: 0, data: report);
exit(0);
}
}
exit(99);
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
47.5%