QID 316980
Date Published: 2021-06-21
QID 316980: Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability(cisco-sa-esa-wsa-cert-vali-n8L97RW)
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for
Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated,
remote attacker to intercept traffic between an affected device and the AMP servers.
Affected Products
Cisco ESA and Cisco WSA if they are running a vulnerable release of Cisco AsyncOS and are
configured to integrate with a Cisco AMP for Endpoints console.
QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.
A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.
Customers are advised to refer to cisco-sa-esa-wsa-cert-vali-n8L97RW for more information.
- cisco-sa-esa-wsa-cert-vali-n8L97RW -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW
CVEs related to QID 316980
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-esa-wsa-cert-vali-n8L97RW |
|