5
CVSSv2

CVE-2019-1672

Published: 08/02/2019 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.8 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote malicious user to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the malicious user to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco web security appliance 10.1.0-204

cisco web security appliance 11.5.1-fcs-115

cisco web security appliance 10.5.2-072

Vendor Advisories

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt f ...