First published: Thu Sep 21 2017(Updated: )
A vulnerability in the HTTP web interface for Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause an HTTP Application Optimization (AO) related process to restart, causing a partial denial of service (DoS) condition. The vulnerability is due to lack of input validation of user-supplied input parameters within an HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request through the targeted device. An exploit could allow the attacker to cause a DoS condition due to a process unexpectedly restarting. The WAAS could drop traffic during the brief time the process is restarting. Cisco Bug IDs: CSCvc63048.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services | =6.2\(3a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12250 has a severity rating of medium and could lead to a partial denial of service for affected systems.
To remediate CVE-2017-12250, upgrade Cisco Wide Area Application Services to a version that addresses the vulnerability.
CVE-2017-12250 specifically affects Cisco Wide Area Application Services version 6.2(3a).
Yes, CVE-2017-12250 can be exploited by unauthenticated remote attackers.
CVE-2017-12250 can cause an HTTP Application Optimization process to restart, resulting in a partial denial of service condition.