cisco web-security-appliance CVE-2019-1672 is a vulnerability in Cisco Web Security Appliance
Published on February 8, 2019

Cisco Web Security Appliance Decryption Policy Bypass Vulnerability
A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

Vendor Advisory NVD

Weakness Type

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2019-1672 has been classified to as a Resource Exhaustion vulnerability or weakness.


Products Associated with CVE-2019-1672

Want to know whenever a new CVE is published for Cisco Web Security Appliance? stack.watch will email you.

 

Affected Versions

Cisco Web Security Appliance (WSA):

Exploit Probability

EPSS
0.18%
Percentile
38.87%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.