A vulnerability in AsyncOS for the Cisco Web Security Appliance (WSA) could allow an unauthenticated, local attacker to log in to the device with the privileges of a limited user or an unauthenticated, remote attacker to authenticate to certain areas of the web GUI.

The vulnerability is due to a user account that has a default and static password.

An attacker could exploit this vulnerability by connecting to the affected system using this default account.

An exploit could allow the attacker to log in with the default credentials, allowing the attacker to view the system’s serial number by using the CLI or to download reports by using the web interface.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa4
A vulnerability in AsyncOS for the Cisco Web Security Appliance (WSA) could allow an unauthenticated, local attacker to log in to the device with the privileges of a limited user or an unauthenticated, remote attacker to authenticate to certain areas of the web GUI.

The vulnerability is due to a user account that has a default and static password.

An attacker could exploit this vulnerability by connecting to the affected system using this default account.

An exploit could allow the attacker to log in with the default credentials, allowing the attacker to view the system’s serial number by using the CLI or to download reports by using the web interface.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa4

Security Impact Rating: Medium

CVE: CVE-2017-6750

Leave a Reply