CVE-2016-9212Improper Input Validation in Cisco WEB Security Appliance

Severity
7.5HIGHNVD
EPSS
0.9%
top 24.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateMay 17

Description

A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the dev

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDcisco/web_security_appliance9.0.1-162, 9.1.1-074+1
CVEListV5cisco/cisco_web_security_applianceCisco Web Security Appliance

🔴Vulnerability Details

2
GHSA
GHSA-334p-wmh8-9fqw: A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could all2022-05-17
CVEList
CVE-2016-9212: A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could all2016-12-14

📋Vendor Advisories

1
Cisco
Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability2016-12-07

💬Community

1
Bugzilla
CVE-2016-2047 mysql: ssl-validate-cert incorrect hostname check2016-01-26
CVE-2016-9212 — Improper Input Validation in Cisco | cvebase