Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-162:*:*:*:*:*:*:*", "matchCriteriaId": "C5BF001A-7ADB-4976-8A50-0EFC53FB6AEC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*", "matchCriteriaId": "5AD5471D-6A95-4BF2-9ECB-3F7AE74BCE57", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-485:*:*:*:*:*:*:*", "matchCriteriaId": "72CE42EB-F7F1-4F68-BFCF-B452A2C0AC13", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-232:*:*:*:*:*:*:*", "matchCriteriaId": "8F4BDE8C-6D41-4BCF-8BB3-9256E2AD09E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-233:*:*:*:*:*:*:*", "matchCriteriaId": "5C84C8F0-4722-4385-B3CD-86E05F3D72BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_appliance:10.1.0-204:*:*:*:*:*:*:*", "matchCriteriaId": "AC71F9F5-B0BA-4415-A4C8-9D0B15732A54", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_virtual_appliance:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0CAE1AB3-224F-473D-8E41-DF641CFBF864", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_virtual_appliance:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "69528D17-2EA4-4CF5-B2D4-26B185C66ED8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_virtual_appliance:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BED59A8D-41E6-448E-AEEF-91400742CC0B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:web_security_virtual_appliance:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFF6B908-B1A0-48FC-A481-CA2AF9738BE0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the web proxy functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to forward traffic from the web proxy interface of an affected device to the administrative management interface of an affected device, aka an Access Control Bypass Vulnerability. Affected Products: virtual and hardware versions of Cisco Web Security Appliance (WSA). More Information: CSCvd88863. Known Affected Releases: 10.1.0-204 9.0.0-485."}, {"lang": "es", "value": "Una vulnerabilidad en la funcionalidad proxy web de Cisco Web Security Appearance (WSA) podr\u00eda permitir que un atacante remoto no autenticado redirija tr\u00e1fico de la interfaz proxy web de un dispositivo afectado a una interfaz de administraci\u00f3n de un dispositivo afectado. Esta vulnerabilidad tambi\u00e9n se conoce como \"Access Control Bypass Vulnerability\". Productos afectados: versiones de hardware y virtuales de Cisco Web Security Appliance (WSA). M\u00e1s informaci\u00f3n: CSCvd88863. Versiones afectadas conocidas: 10.1.0-204 9.0.0-485."}], "id": "CVE-2017-6751", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-07-25T19:29:00.363", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/99967"}, {"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1038959"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/99967"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1038959"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa5"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}