Denial of service in Cisco Wide Area Application Services



Published: 2017-09-21
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12250
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Wide Area Application Services
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU8544

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12250

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the HTTP web interface for Cisco Wide Area Application Services (WAAS) due to input validation of user-supplied input parameters. a remote attacker can send a specially crafted HTTP request and cause an HTTP Application Optimization (AO) related process to restart.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

The vulnerability is addressed in the following versions: 6.3(0.175), 6.2(3c)6, 6.2(3.22).

Vulnerable software versions

Cisco Wide Area Application Services: 6.2.3a

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-waas


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###