First published: Tue Jul 25 2017(Updated: )
A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid administrator credentials. Affected Products: Cisco AsyncOS Software 10.0 and later for WSA on both virtual and hardware appliances. More Information: CSCvd88862. Known Affected Releases: 10.1.0-204. Known Fixed Releases: 10.5.1-270 10.1.1-235.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =10.0.0-233 | |
Cisco Web Security Appliance | =10.0_base | |
Cisco Web Security Appliance | =10.1.0 | |
Cisco Web Security Appliance | =10.1.0-204 | |
Cisco Web Security Appliance | =10.1.1-230 | |
Cisco Web Security Appliance | =10.1.1-234 | |
Cisco Web Security Appliance | =10.5.0 | |
Cisco Web Security Appliance | =10.5.0-358 | |
Cisco Web Security Appliance | =11.0.0 | |
Cisco Web Security Appliance | =11.0.0-613 | |
Cisco Web Security Appliance | =11.0.0-641 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6746 is rated as high severity due to its potential for command injection and privilege escalation.
To remediate CVE-2017-6746, update your Cisco Web Security Appliance to the latest software version provided by Cisco.
CVE-2017-6746 affects Cisco Web Security Appliance running versions 10.0.0-233, 10.0_base, 10.1.0, 10.1.0-204, 10.1.1-230, 10.1.1-234, 10.5.0, 10.5.0-358, 11.0.0, 11.0.0-613, and 11.0.0-641.
An authenticated attacker with valid administrator credentials can exploit CVE-2017-6746.
Exploitation of CVE-2017-6746 can lead to command injection vulnerabilities and allow an attacker to achieve root privileges.