SB2020030511 - Denial of service in Cisco ESA, Cisco WSA, and Cisco SMA



SB2020030511 - Denial of service in Cisco ESA, Cisco WSA, and Cisco SMA

Published: March 5, 2020 Updated: May 11, 2020

Security Bulletin ID SB2020030511
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2020-3164)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of specific HTTP request headers. A remote attacker can send a specially crafted HTTP request to an affected device, trigger a prolonged status of high CPU utilization relative to the GUI process(es) and perform a denial of service (DoS) attack.


2) Open redirect (CVE-ID: CVE-2020-3178)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper input validation of the parameters of an HTTP request in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA). A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


Remediation

Install update from vendor's website.