Improper input validation in Cisco Wide Area Application Services - CVE-2017-12250
Published: September 21, 2017
Vulnerability identifier: #VU8544
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12250
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Wide Area Application Services
Cisco Wide Area Application Services
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the HTTP web interface for Cisco Wide Area Application Services (WAAS) due to input validation of user-supplied input parameters. a remote attacker can send a specially crafted HTTP request and cause an HTTP Application Optimization (AO) related process to restart.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists in the HTTP web interface for Cisco Wide Area Application Services (WAAS) due to input validation of user-supplied input parameters. a remote attacker can send a specially crafted HTTP request and cause an HTTP Application Optimization (AO) related process to restart.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-12250
The vulnerability is addressed in the following versions: 6.3(0.175), 6.2(3c)6, 6.2(3.22).