First published: Thu Jun 07 2018(Updated: )
A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =10.5.1 | |
Cisco Web Security Appliance | =10.5.1-296 | |
Cisco Web Security Appliance | =10.5.2 | |
Cisco Web Security Appliance | =11.0.0 | |
Cisco Web Security Appliance | =11.5.0-fcs-442 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0353 is a vulnerability in the traffic-monitoring functions in Cisco Web Security Appliance (WSA) that allows an unauthenticated, remote attacker to bypass security protections.
CVE-2018-0353 has a severity rating of 7.5 (high).
Cisco Web Security Appliance versions 10.5.1, 10.5.1-296, 10.5.2, 11.0.0, and 11.5.0-fcs-442 are affected by CVE-2018-0353.
An attacker can exploit CVE-2018-0353 by circumventing Layer 4 Traffic Monitor (L4TM) functionality and bypassing security protections.
Yes, Cisco has released a security advisory with fixes for CVE-2018-0353. Please refer to the official Cisco Security Advisory for more information.