CVE-2019-1876
Summary
| CVE | CVE-2019-1876 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-20 03:15:00 UTC |
| Updated | 2019-10-09 23:48:00 UTC |
| Description | A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies. |
Risk And Classification
Problem Types: CWE-306
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Wide Area Application Services | 5.5(7) | All | All | All |
| Application | Cisco | Wide Area Application Services | 5.5\(7\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.1(1) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.1\(1\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.4(3b) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.4\(3b\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 5.5\(7\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.1\(1\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.4\(3b\) | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Wide Area Application Services Software HTTPS Proxy Authentication Bypass Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| Cisco Wide Area Application Services Software CVE-2019-1876 Authentication Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.