First published: Thu Jul 08 2021(Updated: )
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =11.8.0-429 | |
Cisco Web Security Appliance | =11.8.0-453 | |
Cisco AsyncOS | >=11.8.0<12.0.3-005 | |
Cisco AsyncOS | >=12.5.0<12.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1359 is a vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) that allows an authenticated, remote attacker to perform command injection and elevate privileges to root.
CVE-2021-1359 has a severity rating of 8.8 (critical).
Cisco Web Security Appliance versions 11.8.0-429 and 11.8.0-453, as well as Cisco AsyncOS versions 11.8.0 to 12.0.3-005 and 12.5.0 to 12.5.2, are affected by CVE-2021-1359.
An attacker can exploit CVE-2021-1359 by supplying malicious XML input to the affected Cisco Web Security Appliance, allowing them to perform command injection and gain root privileges.
Yes, Cisco has released a security advisory and patches to address the vulnerability. Please refer to the reference link for more information.