7.7
CWE
20
Advisory Published
Updated

CVE-2019-1884: Input Validation

First published: Thu Jul 04 2019(Updated: )

A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco AsyncOS>=10.1<10.5.5-005
Cisco AsyncOS>=11.5<11.5.2-020
Cisco AsyncOS>=11.7<11.7.0-407
Cisco Web Security Appliance=10.1.4-017
Cisco Web Security Appliance=10.5.2-072
Cisco Web Security Appliance=11.5.1-fcs-125
Cisco Web Security Appliance=11.7.0-256

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-1884?

    CVE-2019-1884 is a vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) that could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

  • How does CVE-2019-1884 impact Cisco AsyncOS Software?

    CVE-2019-1884 could cause a denial of service (DoS) condition on an affected device running Cisco AsyncOS Software for Cisco Web Security Appliance.

  • Which versions of Cisco AsyncOS Software are affected by CVE-2019-1884?

    Versions of Cisco AsyncOS Software for Cisco Web Security Appliance between 10.1 and 11.7 are affected by CVE-2019-1884.

  • What is the severity of CVE-2019-1884?

    CVE-2019-1884 has a severity rating of high with a score of 6.5 out of 10.

  • How can I fix CVE-2019-1884?

    To mitigate CVE-2019-1884, Cisco recommends upgrading to a fixed software release based on the information provided in the Cisco Security Advisory.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203