// For flags

CVE-2019-15956

Cisco Web Security Appliance Unauthorized Device Reset Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations.

Una vulnerabilidad en la interfaz de administración web del Software Cisco AsyncOS para Cisco Web Security Appliance (WSA), podría permitir a un atacante remoto autenticado realizar un reinicio no autorizado del sistema en un dispositivo afectado. La vulnerabilidad es debido a controles de autorización inapropiados para una URL específica en la interfaz de administración web. Un atacante podría explotar esta vulnerabilidad al enviar una petición HTTP diseñada en un dispositivo afectado. Una explotación con éxito podría tener un doble impacto: el atacante podría cambiar la contraseña del administrador, conseguir acceso privilegiado o restablecer los detalles de configuración de red, causando una condición de denegación de servicio (DoS). En ambos escenarios, una intervención manual es requerida para restaurar las operaciones normales.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-09-06 CVE Reserved
  • 2019-11-26 CVE Published
  • 2023-08-12 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asyncos
Search vendor "Cisco" for product "Asyncos"
>= 10.1 < 10.1.5-004
Search vendor "Cisco" for product "Asyncos" and version " >= 10.1 < 10.1.5-004"
-
Affected
Cisco
Search vendor "Cisco"
Asyncos
Search vendor "Cisco" for product "Asyncos"
>= 10.5 < 11.5.3-016
Search vendor "Cisco" for product "Asyncos" and version " >= 10.5 < 11.5.3-016"
-
Affected
Cisco
Search vendor "Cisco"
Asyncos
Search vendor "Cisco" for product "Asyncos"
>= 11.7 < 11.7.1-006
Search vendor "Cisco" for product "Asyncos" and version " >= 11.7 < 11.7.1-006"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
10.5.2-072
Search vendor "Cisco" for product "Web Security Appliance" and version "10.5.2-072"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
11.5.1-fcs-125
Search vendor "Cisco" for product "Web Security Appliance" and version "11.5.1-fcs-125"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
11.7.0-fcs-418
Search vendor "Cisco" for product "Web Security Appliance" and version "11.7.0-fcs-418"
-
Affected