First published: Wed May 03 2017(Updated: )
A vulnerability in SMART-SSL Accelerator functionality for Cisco Wide Area Application Services (WAAS) 6.2.1, 6.2.1a, and 6.2.3a could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition where the WAN optimization could stop functioning while the process restarts. The vulnerability is due to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) alert being incorrectly handled when in a specific SSL/TLS connection state. An attacker could exploit this vulnerability by establishing a SMART-SSL connection through the targeted device. The attacker would then send a crafted stream of SSL/TLS traffic. An exploit could allow the attacker to cause a DoS condition where WAN optimization could stop processing traffic for a short period of time. Cisco Bug IDs: CSCvb71133.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services | =6.2.1 | |
Cisco Wide Area Application Services | =6.2.1a | |
Cisco Wide Area Application Services | =6.2.3a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6628 is classified as a high severity vulnerability due to its potential to cause a denial of service (DoS) condition.
To fix CVE-2017-6628, upgrade to the latest version of Cisco Wide Area Application Services available.
CVE-2017-6628 affects Cisco Wide Area Application Services versions 6.2.1, 6.2.1a, and 6.2.3a.
CVE-2017-6628 allows an unauthenticated remote attacker to trigger a denial of service condition.
The impact of CVE-2017-6628 on network operations can be significant, as it may cause WAN optimization processes to stop functioning temporarily.