Vulnerability Description
Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Web Security Appliance | 8.5_base |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/viewAlert.x?alertId=38305Vendor Advisory
- http://www.securitytracker.com/id/1032097Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/viewAlert.x?alertId=38305Vendor Advisory
- http://www.securitytracker.com/id/1032097Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-0692?
CVE-2015-0692 is a vulnerability with a CVSS score of 7.2 (HIGH). Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute...
How severe is CVE-2015-0692?
CVE-2015-0692 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0692?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Web Security Appliance.