Cisco Content Service Switch performs soft reset when XML data is sent to web management interface
2002-05-22T00:00:00
ID VU:686939 Type cert Reporter CERT Modified 2002-05-30T14:37:00
Description
Overview
The Cisco Content Service Switch contains a denial-of-service vulnerability that allows remote attackers to perform a soft reset on affected devices.
Description
The Cisco Content Service Switch (CSS) products include support for the session and application layers. This additional functionality allows a CSS device to make packet switching decisions based on packet contents (such as HTML tags) rather than relying solely upon packet header information.
The CSS 11000 series switch contains a vulnerability that causes the device to perform a soft reset when XML data is sent to its web management interface.
Impact
This vulnerability allows remote attackers to reboot affected devices, creating a denial-of-service condition.
Solution
Apply a patch from Cisco
Cisco has prepared a patch to address this vulnerability. For more information on affected products and obtaining patches, please see
Cisco customers who are unable to patch affected devices can limit the exploitation of this vulnerability by preventing access to the web management interface. This can be accomplished via the use of a firewall or by disabling the web management interface from an alternate management interface.
Vendor Information
686939
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Cisco Affected
Notified: May 15, 2002 Updated: May 23, 2002
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
CVSS Metrics
Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |
This document was written by Jeffrey P. Lanza based on information provided by Cisco Systems.
Other Information
CVE IDs: | CVE-2002-0792
---|--- Severity Metric: | 12.66 Date Public: | 2002-05-15 Date First Published: | 2002-05-22 Date Last Updated: | 2002-05-30 14:37 UTC Document Revision: | 14
{"id": "VU:686939", "type": "cert", "bulletinFamily": "info", "title": "Cisco Content Service Switch performs soft reset when XML data is sent to web management interface", "description": "### Overview \n\nThe Cisco Content Service Switch contains a denial-of-service vulnerability that allows remote attackers to perform a soft reset on affected devices.\n\n### Description \n\nThe Cisco Content Service Switch (CSS) products include support for the session and application layers. This additional functionality allows a CSS device to make packet switching decisions based on packet contents (such as HTML tags) rather than relying solely upon packet header information.\n\nThe CSS 11000 series switch contains a vulnerability that causes the device to perform a soft reset when XML data is sent to its web management interface. \n \n--- \n \n### Impact \n\nThis vulnerability allows remote attackers to reboot affected devices, creating a denial-of-service condition. \n \n--- \n \n### Solution \n\n**Apply a patch from Cisco** \n \nCisco has prepared a patch to address this vulnerability. For more information on affected products and obtaining patches, please see \n \n[_http://www.cisco.com/warp/public/707/css-http-post-pub.shtml_](<http://www.cisco.com/warp/public/707/css-http-post-pub.shtml>) \n \n--- \n \n**Prevent access to the web management interface**\n\n \nCisco customers who are unable to patch affected devices can limit the exploitation of this vulnerability by preventing access to the web management interface. This can be accomplished via the use of a firewall or by disabling the web management interface from an alternate management interface. \n \n--- \n \n### Vendor Information\n\n686939\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Cisco Affected\n\nNotified: May 15, 2002 Updated: May 23, 2002 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe CERT/CC has no additional comments at this time.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23686939 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://www.cisco.com/warp/public/707/css-http-post-pub.shtml>\n * <http://www.securityfocus.com/bid/4748>\n\n### Acknowledgements\n\nThis document was written by Jeffrey P. Lanza based on information provided by Cisco Systems.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2002-0792](<http://web.nvd.nist.gov/vuln/detail/CVE-2002-0792>) \n---|--- \n**Severity Metric:** | 12.66 \n**Date Public:** | 2002-05-15 \n**Date First Published:** | 2002-05-22 \n**Date Last Updated: ** | 2002-05-30 14:37 UTC \n**Document Revision: ** | 14 \n", "published": "2002-05-22T00:00:00", "modified": "2002-05-30T14:37:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.kb.cert.org/vuls/id/686939", "reporter": "CERT", "references": ["http://www.cisco.com/warp/public/707/css-http-post-pub.shtml", "http://www.securityfocus.com/bid/4748"], "cvelist": ["CVE-2002-0792"], "lastseen": "2020-09-18T20:45:00", "viewCount": 0, "enchantments": {"score": {"value": 6.6, "vector": "NONE", "modified": "2020-09-18T20:45:00", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2002-0792"]}, {"type": "osvdb", "idList": ["OSVDB:8854", "OSVDB:8855"]}, {"type": "cert", "idList": ["VU:330275"]}], "modified": "2020-09-18T20:45:00", "rev": 2}, "vulnersScore": 6.6}, "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:19:06", "description": "The web management interface for Cisco Content Service Switch (CSS) 11000 switches allows remote attackers to cause a denial of service (soft reset) via (1) an HTTPS POST request, or (2) malformed XML data.", "edition": 4, "cvss3": {}, "published": "2002-08-12T04:00:00", "title": "CVE-2002-0792", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2002-0792"], "modified": "2008-09-05T20:28:00", "cpe": ["cpe:/a:cisco:webns:5.0_0.038s", "cpe:/a:cisco:webns:4.0_1.053s", "cpe:/a:cisco:webns:5.1_0.0.10", "cpe:/h:cisco:content_services_switch_11000:*", "cpe:/a:cisco:webns:5.0_1.012s", "cpe:/a:cisco:webns:5.0_2.005s"], "id": "CVE-2002-0792", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0792", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:h:cisco:content_services_switch_11000:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webns:4.0_1.053s:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webns:5.0_1.012s:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webns:5.1_0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webns:5.0_0.038s:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webns:5.0_2.005s:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:03", "bulletinFamily": "software", "cvelist": ["CVE-2002-0792"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.cisco.com/warp/public/707/css-http-post-pub.shtml)\n[Related OSVDB ID: 8855](https://vulners.com/osvdb/OSVDB:8855)\nISS X-Force ID: 9083\n[CVE-2002-0792](https://vulners.com/cve/CVE-2002-0792)\nCERT VU: 330275\nBugtraq ID: 4748\n", "modified": "2002-05-15T00:00:00", "published": "2002-05-15T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:8854", "id": "OSVDB:8854", "type": "osvdb", "title": "Cisco CSS 11000 Web Interface HTTPS POST DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:03", "bulletinFamily": "software", "cvelist": ["CVE-2002-0792"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.cisco.com/warp/public/707/css-http-post-pub.shtml)\n[Related OSVDB ID: 8854](https://vulners.com/osvdb/OSVDB:8854)\nISS X-Force ID: 9083\n[CVE-2002-0792](https://vulners.com/cve/CVE-2002-0792)\nCERT VU: 686939\nBugtraq ID: 4748\n", "modified": "2002-05-15T00:00:00", "published": "2002-05-15T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:8855", "id": "OSVDB:8855", "type": "osvdb", "title": "Cisco CSS 11000 Web Interface Malformed XML Data DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "cert": [{"lastseen": "2020-09-18T20:44:59", "bulletinFamily": "info", "cvelist": ["CVE-2002-0792"], "description": "### Overview \n\nThe Cisco Content Service Switch contains a denial-of-service vulnerability that allows remote attackers to reboot affected devices.\n\n### Description \n\nThe Cisco Content Service Switch (CSS) products include support for the session and application layers. This additional functionality allows a CSS device to make packet switching decisions based on packet contents (such as HTML tags) rather than relying solely upon packet header information.\n\nThe CSS 11000 series switch contains a vulnerability that causes the device to reboot when an HTTPS POST request is sent to its web management interface. Please note that this vulnerability can be exploited by unauthenticated attackers. \n \n--- \n \n### Impact \n\nThis vulnerability allows arbitrary remote attackers to reboot affected devices, creating a denial-of-service condition. \n \n--- \n \n### Solution \n\n**Apply a patch from Cisco** \n \nCisco has prepared a patch to address this vulnerability. For more information on affected products and obtaining patches, please see \n \n[_http://www.cisco.com/warp/public/707/css-http-post-pub.shtml_](<http://www.cisco.com/warp/public/707/css-http-post-pub.shtml>) \n \n--- \n \n**Prevent access to the web management interface**\n\n \nCisco customers who are unable to patch affected devices can limit the exploitation of this vulnerability by preventing access to the web management interface. This can be accomplished via the use of a firewall or by disabling the web management interface from an alternate management interface. \n \n--- \n \n### Vendor Information\n\n330275\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Cisco Affected\n\nNotified: May 15, 2002 Updated: May 23, 2002 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe CERT/CC has no additional comments at this time.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23330275 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://www.cisco.com/warp/public/707/css-http-post-pub.shtml>\n * <http://www.securityfocus.com/bid/4747>\n\n### Acknowledgements\n\nThis document was written by Jeffrey P. Lanza based on information provided by Cisco Systems.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2002-0792](<http://web.nvd.nist.gov/vuln/detail/CVE-2002-0792>) \n---|--- \n**Severity Metric:** | 16.88 \n**Date Public:** | 2002-05-15 \n**Date First Published:** | 2002-05-22 \n**Date Last Updated: ** | 2002-05-30 14:37 UTC \n**Document Revision: ** | 18 \n", "modified": "2002-05-30T14:37:00", "published": "2002-05-22T00:00:00", "id": "VU:330275", "href": "https://www.kb.cert.org/vuls/id/330275", "type": "cert", "title": "Cisco Content Service Switch reboots when HTTPS POST request is sent to web management interface", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}