
====================================================================

                               CERT-Renater

                    Note d'Information No. 2016/VULN031
_____________________________________________________________________

DATE                : 22/01/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco Web Security Appliance (WSA) versions
                        8.5.3-055, 9.1.0-000, 9.5.0-235.

======================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160119-wsa
_____________________________________________________________________

Cisco Security Advisory

Cisco Web Security Appliance Security Bypass Vulnerability

Medium

Advisory ID:

cisco-sa-20160119-wsa

Published:

2016 January 19 08:00 GMT

Version 1.0:

Final

CVSS Score:

Base - 5.0

Workarounds:

No workarounds available

Cisco Bug IDs:

CSCuw32090

CSCux00848

CVE-2016-1296

CWE-264

A vulnerability in the proxy engine of the Cisco Web Security Appliance
(WSA) could allow an unauthenticated, remote attacker to bypass
security restrictions.

The vulnerability is due to improper handling of malformed HTTP
methods. An attacker could exploit this vulnerability by crafting an
improper HTTP method.
A successful exploit could allow the attacker to circumvent WSA
functionality that prevents proxied network traffic.

Cisco released software updates that address this vulnerability. There
are no workarounds that mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160119-wsa


Vulnerable Products

Cisco Web Security Appliance (WSA) versions 8.5.3-055, 9.1.0-000, and
9.5.0-235 are vulnerable.

Products Confirmed Not Vulnerable

No other Cisco products are currently known to be affected by this
vulnerability.


There are no workarounds that mitigate this vulnerability.


When considering software upgrades, customers are advised to consult
the Cisco Security Advisories and Responses archive at
http://www.cisco.com/go/psirt and review subsequent advisories to
determine exposure and a complete upgrade solution.

In all cases, customers should ensure that the devices to upgrade
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.

The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160119-wsa

Version	Description 		Section	Status	Date

1.0	Initial public release.	-	Final	2016-January-19

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits
the distribution URL is an uncontrolled copy and may lack important
information or contain factual errors. The information in this document
is intended for end users of Cisco products.


==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================





