QID 317012
Date Published: 2021-08-24
QID 317012: Cisco Web Security Appliance (WSA) Server Name Identification Data Exfiltration Vulnerability(cisco-sa-sni-data-exfil-mFgzXqLN)
A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA)
could allow an unauthenticated, remote attacker to bypass filtering technology
on an affected device and exfiltrate data from a compromised host.
Affected Products
At the time of publication, this vulnerability affected the WSA Software release 14.5 (From BugID CSCvy50873)
QID Detection Logic (Authenticated):
The Qid checks for the Vulnerable version of Cisco WSA in the response of "version" command.
An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server.
A successful exploit could allow the attacker to execute a command-and-control attack
on a compromised host and perform additional data exfiltration attacks.
Customers are advised to refer to cisco-sa-sni-data-exfil-mFgzXqLN for more information.
- cisco-sa-sni-data-exfil-mFgzXqLN -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN
CVEs related to QID 317012
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-sni-data-exfil-mFgzXqLN |
|