Lucene search

K
ciscoCiscoCISCO-SA-20120412-CVE-2012-1326
HistoryApr 12, 2012 - 4:01 p.m.

Cisco IronPort Web Security Appliance basicConstraints Parameter Processing Man-in-the-Middle Vulnerability

2012-04-1216:01:37
tools.cisco.com
14

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

41.6%

Cisco IronPort Web Security Appliance (WSA) software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct man-in-the-middle attacks against a targeted system.

The vulnerability is in the insecure SSL implementation of the affected operating system due to improper handling of SSL and Transport Layer Security (TLS) security certificates. The affected implementation could insecurely validate the certificate authority (CA) hierarchy and could trust illegitimate certificates.

An unauthenticated, remote attacker could exploit the vulnerability by using a legitimate certificate to generate a security certificate for a third-party domain. The attacker would then attempt to convince an affected user to visit the domain and establish an SSL connection with the domain by using the certificate provided. A successful attack could allow the attacker to conduct a man-in-the-middle attack against the affected user.

Cisco IronPort has confirmed the vulnerability; however, updates are not yet available. A workaround exists to mitigate the impact of this vulnerability.

A successful attack would require the attacker to have access to a network that is adjacent to the targeted user’s system. This requirement would limit the likelihood of an attack.

A workaround exists that mitigates this vulnerability. The WSA can be configured to drop invalid certificates via the administrative GUI under Security Services -> HTTPS Proxy. The section “Invalid Certificate Handling” may be used to configure the handling of invalid certificates, enabling the administrator to configure the WSA to drop invalid certificates.

Affected configurations

Vulners
Node
ciscoironport_web_security_applianceMatchany
OR
ciscoironport_web_security_applianceMatchany
VendorProductVersionCPE
ciscoironport_web_security_applianceanycpe:2.3:a:cisco:ironport_web_security_appliance:any:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

41.6%

Related for CISCO-SA-20120412-CVE-2012-1326