Lucene search

K
zdiAndrea Micalizzi aka rgodZDI-13-276
HistoryDec 15, 2013 - 12:00 a.m.

Cisco WAAS Mobile Server ReportReceiver CAB Processing Remote Code Execution Vulnerability

2013-12-1500:00:00
Andrea Micalizzi aka rgod
www.zerodayinitiative.com
13

EPSS

0.187

Percentile

96.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CISCO WAAS Mobile Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of CAB files uploaded through ReportReceiver. By uploading a crafted CAB file, an attacker is able to add a hostile web page to the web server. Using this, an attacker is able to run arbitrary code as either DefaultAppPool or NetworkService, depending on the operating system version.

EPSS

0.187

Percentile

96.3%