#VU50067 Allocation of Resources Without Limits or Throttling in Cisco Umbrella


Published: 2021-01-20 | Updated: 2021-01-27

Vulnerability identifier: #VU50067

Vulnerability risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-1350

CWE-ID: CWE-770

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Umbrella
Client/Desktop applications / Other client software

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient rate limiting controls in the web UI. A remote attacker can send specially crafted HTTPS packets at a high and sustained rate and negatively affect the performance of the web UI.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco Umbrella: 2.6.5


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability