Preview Tool

Cisco Bug: CSCum97038 - CWS: ISR may crash when HTTPS is redirected to the Scansafe Towers

Last Modified

Jan 19, 2019

Products (82)

  • Cisco IOS
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco C892FSP Integrated Services Router
  • Cisco 812 CiFi Integrated Services Router
  • Cisco 888W Integrated Services Router
  • Cisco 2951 Integrated Services Router
  • Cisco 881SRSTW Integrated Services Router
  • Cisco 886VAG 3G Integrated Services Router
  • Cisco C897VA Integrated Services Router
  • Cisco 892W Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases

15.3(3)M 15.5(1)T

Description (partial)

A vulnerability in content scan module of Cisco IOS could allow an unauthenticated, remote attacker to cause a reload of the affected device.
The vulnerability is due to processing of HTTPS packets that need to be redirected to Scansafe tower.. An attacker could exploit this vulnerability by 
sending HTTPS packets to be redirected to Scansafe tower. An exploit could allow the attacker to cause a reload of the affected device.

This was first identified on an ISR running Cisco IOS version 15.3(3)M2. All the 3 following conditions must be met in order to run into the problem.
1. HTTPS traffic must be redirected to the Scan Safe Towers 
2. The router egress interface must have very low bandwidth 
3. The interface should be highly congested.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.