First published: Thu Jun 20 2019(Updated: )
A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services | =5.5\(7\) | |
Cisco Wide Area Application Services | =6.1\(1\) | |
Cisco Wide Area Application Services | =6.4\(3b\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1876 is classified as a critical severity vulnerability due to the potential for unauthenticated remote access.
To mitigate CVE-2019-1876, it is recommended to upgrade Cisco Wide Area Application Services to the latest available version.
CVE-2019-1876 can be exploited by attackers to leverage the Central Manager as an unauthorized HTTPS proxy.
The affected versions of Cisco Wide Area Application Services include 5.5(7), 6.1(1), and 6.4(3b).
Organizations using the vulnerable versions of Cisco Wide Area Application Services may be adversely affected if the vulnerability is exploited.