QID 316980

Date Published: 2021-06-21

QID 316980: Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability(cisco-sa-esa-wsa-cert-vali-n8L97RW)

A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for
Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated,
remote attacker to intercept traffic between an affected device and the AMP servers.

Affected Products
Cisco ESA and Cisco WSA if they are running a vulnerable release of Cisco AsyncOS and are
configured to integrate with a Cisco AMP for Endpoints console.

QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.

A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.

  • CVSS V3 rated as High - 7.4 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-esa-wsa-cert-vali-n8L97RW for more information.

    CVEs related to QID 316980

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-esa-wsa-cert-vali-n8L97RW URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW