First published: Tue Jul 25 2017(Updated: )
A vulnerability in the web proxy functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to forward traffic from the web proxy interface of an affected device to the administrative management interface of an affected device, aka an Access Control Bypass Vulnerability. Affected Products: virtual and hardware versions of Cisco Web Security Appliance (WSA). More Information: CSCvd88863. Known Affected Releases: 10.1.0-204 9.0.0-485.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =9.0.0-162 | |
Cisco Web Security Appliance | =9.0.0-193 | |
Cisco Web Security Appliance | =9.0.0-485 | |
Cisco Web Security Appliance | =10.0.0-232 | |
Cisco Web Security Appliance | =10.0.0-233 | |
Cisco Web Security Appliance | =10.1.0-204 | |
Cisco Web Security Virtual Appliance | =9.0.0 | |
Cisco Web Security Virtual Appliance | =10.0.0 | |
Cisco Web Security Virtual Appliance | =10.1.0 | |
Cisco Web Security Virtual Appliance | =10.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6751 is classified as a high severity vulnerability due to its potential impact on the security of the Cisco Web Security Appliance.
The recommended fix for CVE-2017-6751 is to upgrade the Cisco Web Security Appliance software to the latest version as specified by Cisco.
CVE-2017-6751 affects multiple versions of the Cisco Web Security Appliance and Cisco Web Security Virtual Appliance.
Yes, CVE-2017-6751 can be exploited by an unauthenticated remote attacker.
CVE-2017-6751 allows attackers to forward traffic from the web proxy interface to the administrative management interface.