QID 316993

Date Published: 2021-07-15

QID 316993: Cisco Web Security Appliance Privilege Escalation Vulnerability(cisco-sa-scr-web-priv-esc-k3HCGJZ)

A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA)
could allow an authenticated, remote attacker to perform
command injection and elevate privileges to root.

Affected Products
Cisco AsyncOS for Cisco WSA, both virtual and hardware appliances.
Vulnerable releases:
Prior to 12.0.3-005
From 12.5 Prior to 12.5.2

QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.

A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system
and elevate privileges to root. An attacker would need a valid user account with the rights to
upload configuration files to exploit this vulnerability.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-scr-web-priv-esc-k3HCGJZ for more information.

    CVEs related to QID 316993

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-scr-web-priv-esc-k3HCGJZ URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ