Vulnerability Details : CVE-2016-9212
A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074.
Vulnerability category: Input validation
Products affected by CVE-2016-9212
- cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9212
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9212
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-9212
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9212
-
http://www.securityfocus.com/bid/94774
Cisco Web Security Appliance CVE-2016-9212 Remote Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1037410
Cisco Web Security Appliance Input Validation Flaw in 'Decrypt for End-User Notification' Parameter Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1
Cisco Web Security Appliance Drop Decrypt Policy Bypass VulnerabilityVendor Advisory
Jump to