SB2020030511 - Denial of service in Cisco ESA, Cisco WSA, and Cisco SMA
Published: March 5, 2020 Updated: May 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2020-3164)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of specific HTTP request headers. A remote attacker can send a specially crafted HTTP request to an affected device, trigger a prolonged status of high CPU utilization relative to the GUI process(es) and perform a denial of service (DoS) attack.
2) Open redirect (CVE-ID: CVE-2020-3178)
The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper input validation of the parameters of an HTTP request in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA). A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
Remediation
Install update from vendor's website.