QID 317012

Date Published: 2021-08-24

QID 317012: Cisco Web Security Appliance (WSA) Server Name Identification Data Exfiltration Vulnerability(cisco-sa-sni-data-exfil-mFgzXqLN)

A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA)
could allow an unauthenticated, remote attacker to bypass filtering technology
on an affected device and exfiltrate data from a compromised host.

Affected Products
At the time of publication, this vulnerability affected the WSA Software release 14.5 (From BugID CSCvy50873)

QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.

An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server.
A successful exploit could allow the attacker to execute a command-and-control attack
on a compromised host and perform additional data exfiltration attacks.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sni-data-exfil-mFgzXqLN for more information.

    CVEs related to QID 317012

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sni-data-exfil-mFgzXqLN URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN