Cisco Web Security Appliance Telnet Remote Code Execution (cisco-sa-20120126-ironport)

critical Nessus Plugin ID 79273

Synopsis

The remote security appliance is missing a vendor-supplied patch.

Description

According to its self-reported version, the version of AsyncOS running on the remote Cisco Web Security Appliance (WSA) is affected by a remote code execution vulnerability due to a buffer overflow condition in the telnet component.

Solution

Apply the relevant update referenced in Cisco Security Advisory cisco-sa-20120126-ironport.

Alternatively, as a workaround, the vendor notes that Telnet services can be disabled on the device.

See Also

http://www.nessus.org/u?a6a6592a

https://tools.cisco.com/bugsearch/bug/CSCuo90523

https://www.freebsd.org/security/advisories/FreeBSD-SA-11:08.telnetd.asc

Plugin Details

Severity: Critical

ID: 79273

File Name: cisco-sa-20120126-wsa.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 11/17/2014

Updated: 5/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-4862

Vulnerability Information

CPE: cpe:/h:cisco:web_security_appliance, cpe:/a:cisco:web_security_appliance, cpe:/o:cisco:web_security_appliance, cpe:/o:cisco:asyncos

Required KB Items: Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion, Host/AsyncOS/Cisco Web Security Appliance/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/28/2014

Vulnerability Publication Date: 12/23/2011

Exploitable With

Core Impact

Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)

ExploitHub (EH-11-760)

Reference Information

CVE: CVE-2011-4862

BID: 51182

CISCO-SA: cisco-sa-20120126-ironport

CISCO-BUG-ID: CSCuo90523