First published: Wed Aug 15 2018(Updated: )
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software | =11.0<11.5.0-614=10.5<10.5.2-072=10.1<10.1.3-054=9.1<Migrate to 10.1.3-054 or later=Prior to 9.1<Migrate to 10.1.3-054 or later | 11.5.0-614 10.5.2-072 10.1.3-054 Migrate to 10.1.3-054 or later Migrate to 10.1.3-054 or later |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180815-wsa-dos is high due to its potential to cause a denial of service (DoS) condition.
To fix cisco-sa-20180815-wsa-dos, upgrade to AsyncOS version 10.1.3-054 or later.
Cisco AsyncOS Software versions prior to 10.1.3-054 on Web Security Appliances are affected by cisco-sa-20180815-wsa-dos.
Yes, cisco-sa-20180815-wsa-dos can be exploited by unauthenticated remote attackers.
cisco-sa-20180815-wsa-dos is a denial of service (DoS) vulnerability.