QID 316993
Date Published: 2021-07-15
QID 316993: Cisco Web Security Appliance Privilege Escalation Vulnerability(cisco-sa-scr-web-priv-esc-k3HCGJZ)
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA)
could allow an authenticated, remote attacker to perform
command injection and elevate privileges to root.
Affected Products
Cisco AsyncOS for Cisco WSA, both virtual and hardware appliances.
Vulnerable releases:
Prior to 12.0.3-005
From 12.5 Prior to 12.5.2
QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.
A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system
and elevate privileges to root. An attacker would need a valid user account with the rights to
upload configuration files to exploit this vulnerability.
Customers are advised to refer to cisco-sa-scr-web-priv-esc-k3HCGJZ for more information.
- cisco-sa-scr-web-priv-esc-k3HCGJZ -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ
CVEs related to QID 316993
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-scr-web-priv-esc-k3HCGJZ |
|