Cisco Secure Web Appliance Multiple Vulnerabilities (cisco-sa-esa-sma-wsa-multi-yKUJhS34)

medium Nessus Plugin ID 215116

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Secure Web Appliance is affected by multiple vulnerabilities.

- A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. (CVE-2025-20184)

- A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker. (CVE-2025-20185)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwk70576

See Also

http://www.nessus.org/u?a765161e

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70576

Plugin Details

Severity: Medium

ID: 215116

File Name: cisco-sa-esa-sma-wsa-multi-yKUJhS34_wsa.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 2/7/2025

Updated: 2/7/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.7

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:N

CVSS Score Source: CVE-2025-20184

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:asyncos, cpe:/o:cisco:web_security_appliance, cpe:/a:cisco:web_security_appliance, cpe:/h:cisco:web_security_appliance

Required KB Items: Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion, Host/AsyncOS/Cisco Web Security Appliance/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 2/5/2025

Vulnerability Publication Date: 2/5/2025

Reference Information

CVE: CVE-2025-20184, CVE-2025-20185

CWE: 20, 250

CISCO-SA: cisco-sa-esa-sma-wsa-multi-yKUJhS34

IAVA: 2025-A-0082

CISCO-BUG-ID: CSCwk70576