High severity7.5NVD Advisory· Published Dec 14, 2016· Updated May 6, 2026
CVE-2016-9212
CVE-2016-9212
Description
A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074.
Affected products
2cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/94774nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037410nvdThird Party AdvisoryVDB Entry
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1nvdVendor Advisory
News mentions
0No linked articles in our index yet.