First published: Thu Oct 05 2017(Updated: )
A vulnerability in the Akamai Connect feature of Cisco Wide Area Application Services (WAAS) Appliances could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) condition on an affected device. The vulnerability is due to certain file-handling inefficiencies of the affected system. An attacker could exploit this vulnerability by directing client systems to access a corrupted file that the client systems cannot decompress correctly. A successful exploit could allow the attacker to cause the affected device to crash or hang unexpectedly and result in a DoS condition that may require manual intervention to regain normal operating conditions. Cisco Bug IDs: CSCve82472.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12256 is classified as critical due to its potential to cause a denial-of-service condition.
To fix CVE-2017-12256, apply the software updates provided by Cisco for the affected Wide Area Application Services appliances.
CVE-2017-12256 affects Cisco Wide Area Application Services appliances that utilize the Akamai Connect feature.
CVE-2017-12256 facilitates remote denial-of-service (DoS) attacks against vulnerable Cisco devices.
No, CVE-2017-12256 can be exploited by unauthenticated remote attackers.