4.3
CVSSv2

CVE-2015-6290

Published: 14/09/2015 Updated: 29/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote malicious user to cause a partial denial of service (DoS) condition due to memory management failures during processing of TCP connections. The vulnerability is due to the improper handling of a malformed HTTP server responses. An unauthenticated, remote attacker with a privileged network position could exploit the vulnerability by conducting a man-in-the-middle (MitM) attack and supplying malformed HTTP server responses to the vulnerable device. A successful exploit could allow the malicious user to cause the device to improperly close TCP connections and fail to free memory resources, resulting in a partial DoS condition. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit the vulnerability, the attacker would need to send crafted HTTP requests to the targeted system through the WSA web interface. Because the attacker does not need to authenticate to send the crafted HTTP requests, the likelihood of an exploit is increased.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco web security virtual appliance 8.0_base

cisco web security virtual appliance 8.0.5

cisco web security virtual appliance 8.0.7

cisco web security virtual appliance 8.0.6

Vendor Advisories

A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to memory management failures during processing of TCP connections The vulnerability is due to the improper handling of a malformed HTTP server responses An unauth ...