Wednesday, December 7, 2016

Cisco Expressway Series Software Security Bypass Vulnerability

A vulnerability in the HTTP traffic server component of Cisco Expressway could allow an unauthenticated, remote attacker to initiate TCP connections to arbitrary hosts. This does not allow for full traffic proxy through the Expressway.

The vulnerability is due to insufficient access control for TCP traffic passed through the Cisco Expressway. An attacker could exploit this vulnerability by sending a crafted URL through the Cisco Expressway. An exploit could allow the attacker to enumerate hosts and services of arbitrary hosts, as well as degrade performance through the Cisco Expressway.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgXB52 A vulnerability in the HTTP traffic server component of Cisco Expressway could allow an unauthenticated, remote attacker to initiate TCP connections to arbitrary hosts. This does not allow for full traffic proxy through the Expressway.

The vulnerability is due to insufficient access control for TCP traffic passed through the Cisco Expressway. An attacker could exploit this vulnerability by sending a crafted URL through the Cisco Expressway. An exploit could allow the attacker to enumerate hosts and services of arbitrary hosts, as well as degrade performance through the Cisco Expressway.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgXB52
Security Impact Rating: Medium
CVE: CVE-2016-9207

from Cisco Security Advisory http://ift.tt/2hgXB52

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.