Vulnerability Details : CVE-2015-0692
Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230.
Products affected by CVE-2015-0692
- cpe:2.3:a:cisco:web_security_appliance:8.5_base:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-0692
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-0692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2015-0692
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0692
-
http://www.securitytracker.com/id/1032097
Cisco Web Security Appliance Python Pickle Module Bugs Let Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=38305
Cisco Web Security Appliance Pickle Python Module Arbitrary Code Execution VulnerabilityVendor Advisory
Jump to