First published: Thu Jul 04 2019(Updated: )
A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | >=10.5<10.5.5-005 | |
Cisco AsyncOS | >=11.5<11.5.2-020 | |
Cisco Web Security Appliance | =10.5.2-072 | |
Cisco Web Security Appliance | =10.5.3-025 | |
Cisco Web Security Appliance | =11.7.0-fcs-334 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1886 is a vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) that could allow a remote attacker to cause a denial of service (DoS) condition.
CVE-2019-1886 has a severity rating of 8.6 (High).
Cisco AsyncOS versions 10.5 through 10.5.5-005 and 11.5 through 11.5.2-020, as well as Cisco Web Security Appliance versions 10.5.2-072, 10.5.3-025, and 11.7.0-fcs-334 are affected by CVE-2019-1886.
An attacker can exploit CVE-2019-1886 by sending specially crafted SSL server certificates to the affected system, causing a denial of service (DoS) condition.
Yes, you can find more information about CVE-2019-1886 at the following links: [SecurityFocus](http://www.securityfocus.com/bid/109049), [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos).