Lucene search

K
ciscoCiscoCISCO-SA-20150223-CVE-2015-0624
HistoryFeb 23, 2015 - 11:32 p.m.

Cisco AsyncOS Software HTTP Redirect Vulnerability

2015-02-2323:32:19
tools.cisco.com
11

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

54.9%

A vulnerability in the web framework of Cisco AsyncOS could allow an unauthenticated, remote attacker to inject a crafted HTTP header that could cause a web page redirection to a malicious website.

The vulnerability is due to insufficient validation of user input before it is used as an HTTP header value. An attacker could exploit this vulnerability by persuading a user to access a crafted URL.

This vulnerability was reported to Cisco by Glafkos Charalambous.

Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.

Cisco indicates through the CVSS score that functional exploit code exists. Proof-of-concept exploit code is publicly available.

Affected configurations

Vulners
Node
ciscoweb_security_appliance_\(wsa\)Matchany
OR
ciscoironport_email_security_applianceMatchany
OR
ciscocontent_security_management_virtual_applianceMatchany
OR
ciscoweb_security_appliance_\(wsa\)Matchany
OR
ciscoironport_email_security_applianceMatchany
OR
ciscocontent_security_management_virtual_applianceMatchany

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

54.9%

Related for CISCO-SA-20150223-CVE-2015-0624