7.5
CWE
254
Advisory Published
Updated

CVE-2018-0353

First published: Thu Jun 07 2018(Updated: )

A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Web Security Appliance=10.5.1
Cisco Web Security Appliance=10.5.1-296
Cisco Web Security Appliance=10.5.2
Cisco Web Security Appliance=11.0.0
Cisco Web Security Appliance=11.5.0-fcs-442

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2018-0353?

    CVE-2018-0353 is a vulnerability in the traffic-monitoring functions in Cisco Web Security Appliance (WSA) that allows an unauthenticated, remote attacker to bypass security protections.

  • How severe is CVE-2018-0353?

    CVE-2018-0353 has a severity rating of 7.5 (high).

  • Which versions of Cisco Web Security Appliance are affected by CVE-2018-0353?

    Cisco Web Security Appliance versions 10.5.1, 10.5.1-296, 10.5.2, 11.0.0, and 11.5.0-fcs-442 are affected by CVE-2018-0353.

  • How can an attacker exploit CVE-2018-0353?

    An attacker can exploit CVE-2018-0353 by circumventing Layer 4 Traffic Monitor (L4TM) functionality and bypassing security protections.

  • Is there a fix available for CVE-2018-0353?

    Yes, Cisco has released a security advisory with fixes for CVE-2018-0353. Please refer to the official Cisco Security Advisory for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203