First published: Wed Jul 29 2015(Updated: )
Cross-site scripting (XSS) vulnerability in Cisco AsyncOS on the Web Security Appliance (WSA) 9.0.0-193; Email Security Appliance (ESA) 8.5.6-113, 9.1.0-032, 9.1.1-000, and 9.6.0-000; and Content Security Management Appliance (SMA) 9.1.0-033 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuu37430, CSCuu37420, CSCut71981, and CSCuv50167.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =9.0.0-193 | |
Cisco Content Security Management Virtual Appliance | =9.1.0-033 | |
Cisco Email Security Appliance | =8.5.6-113 | |
Cisco Email Security Appliance | =9.1.0-032 | |
Cisco Email Security Appliance | =9.1.1-000 | |
Cisco Email Security Appliance | =9.6.0-000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0732 is classified as a high severity vulnerability due to its ability to allow remote attackers to inject arbitrary web scripts.
To mitigate CVE-2015-0732, upgrade your affected Cisco AsyncOS software to the latest version that addresses this vulnerability.
CVE-2015-0732 affects Cisco Web Security Appliance 9.0.0-193, Email Security Appliance versions 8.5.6-113, 9.1.0-032, 9.1.1-000, 9.6.0-000, and Content Security Management Appliance version 9.1.0-033.
Yes, CVE-2015-0732 can potentially lead to data theft as it allows for the injection of harmful scripts that may be executed in a user’s browser.
CVE-2015-0732 is significant, but its impact is primarily limited to users of specific Cisco security products as listed in the vulnerability report.