First published: Wed Dec 14 2016(Updated: )
A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. More Information: CSCvb04312. Known Affected Releases: 9.0.1-162 9.1.1-074. Known Fixed Releases: 10.1.0-129 9.1.2-010.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =9.0.1-162 | |
Cisco Web Security Appliance | =9.1.1-074 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6469 has a medium severity rating due to potential denial of service impacts.
To fix CVE-2016-6469, upgrade to a patched version of Cisco AsyncOS for Cisco Web Security Appliance that is not vulnerable.
CVE-2016-6469 can be exploited by unauthenticated remote attackers to cause denial of service conditions.
CVE-2016-6469 affects Cisco Web Security Appliance versions 9.0.1-162 and 9.1.1-074.
Yes, CVE-2016-6469 is a remote vulnerability that does not require authentication to exploit.