Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1876


A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies.


Published

2019-06-20T03:15:12.167

Last Modified

2024-11-21T04:37:35.670

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-306
  • Type: Primary
    CWE-306

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco wide_area_application_services 5.5\(7\) Yes
Application cisco wide_area_application_services 6.1\(1\) Yes
Application cisco wide_area_application_services 6.4\(3b\) Yes

References