ID

VAR-201504-0272


CVE

CVE-2015-0692


TITLE

Cisco Web Security Any in the appliance device software Python Code execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-002212

DESCRIPTION

Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230. Vendors have confirmed this vulnerability Bug ID CSCut39230 It is released as.The local user can access any arbitrary Python The code may be executed and permissions may be obtained. Cisco Web Security Appliance is prone to a local arbitrary code execution vulnerability. Successful exploits will allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in a denial-of-service condition. This issue is tracked by Cisco Bug ID CSCut39230. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. A security vulnerability exists in Cisco WSA devices using version 8.5.0-ise-147 software

Trust: 1.98

sources: NVD: CVE-2015-0692 // JVNDB: JVNDB-2015-002212 // BID: 74044 // VULHUB: VHN-78638

AFFECTED PRODUCTS

vendor:ciscomodel:web security appliancescope:eqversion:8.5_base

Trust: 1.6

vendor:ciscomodel:web security the appliancescope:eqversion:8.5.0-ise-147

Trust: 0.8

vendor:ciscomodel:web security appliancescope:eqversion:8.5

Trust: 0.3

sources: BID: 74044 // JVNDB: JVNDB-2015-002212 // CNNVD: CNNVD-201504-188 // NVD: CVE-2015-0692

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0692
value: HIGH

Trust: 1.0

NVD: CVE-2015-0692
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201504-188
value: HIGH

Trust: 0.6

VULHUB: VHN-78638
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0692
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-78638
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78638 // JVNDB: JVNDB-2015-002212 // CNNVD: CNNVD-201504-188 // NVD: CVE-2015-0692

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-78638 // JVNDB: JVNDB-2015-002212 // NVD: CVE-2015-0692

THREAT TYPE

local

Trust: 0.9

sources: BID: 74044 // CNNVD: CNNVD-201504-188

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201504-188

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002212

PATCH

title:38305url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38305

Trust: 0.8

sources: JVNDB: JVNDB-2015-002212

EXTERNAL IDS

db:NVDid:CVE-2015-0692

Trust: 2.8

db:SECTRACKid:1032097

Trust: 1.1

db:JVNDBid:JVNDB-2015-002212

Trust: 0.8

db:CNNVDid:CNNVD-201504-188

Trust: 0.7

db:BIDid:74044

Trust: 0.4

db:VULHUBid:VHN-78638

Trust: 0.1

sources: VULHUB: VHN-78638 // BID: 74044 // JVNDB: JVNDB-2015-002212 // CNNVD: CNNVD-201504-188 // NVD: CVE-2015-0692

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38305

Trust: 2.0

url:http://www.securitytracker.com/id/1032097

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0692

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0692

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

sources: VULHUB: VHN-78638 // BID: 74044 // JVNDB: JVNDB-2015-002212 // CNNVD: CNNVD-201504-188 // NVD: CVE-2015-0692

CREDITS

Cisco

Trust: 0.3

sources: BID: 74044

SOURCES

db:VULHUBid:VHN-78638
db:BIDid:74044
db:JVNDBid:JVNDB-2015-002212
db:CNNVDid:CNNVD-201504-188
db:NVDid:CVE-2015-0692

LAST UPDATE DATE

2024-11-23T22:08:08.186000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78638date:2017-01-06T00:00:00
db:BIDid:74044date:2015-04-10T00:00:00
db:JVNDBid:JVNDB-2015-002212date:2015-04-15T00:00:00
db:CNNVDid:CNNVD-201504-188date:2015-04-14T00:00:00
db:NVDid:CVE-2015-0692date:2024-11-21T02:23:32.880

SOURCES RELEASE DATE

db:VULHUBid:VHN-78638date:2015-04-11T00:00:00
db:BIDid:74044date:2015-04-10T00:00:00
db:JVNDBid:JVNDB-2015-002212date:2015-04-15T00:00:00
db:CNNVDid:CNNVD-201504-188date:2015-04-14T00:00:00
db:NVDid:CVE-2015-0692date:2015-04-11T01:59:02.633