TippingPoint Zero Day Initiative

Cisco WAAS Mobile Server ReportReceiver CAB Processing Remote Code Execution Vulnerability

ZDI-13-276: December 15th, 2013


CVSS Score

Affected Vendors

Affected Products

    WAAS Mobile Server

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CISCO WAAS Mobile Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of CAB files uploaded through ReportReceiver. By uploading a crafted CAB file, an attacker is able to add a hostile web page to the web server. Using this, an attacker is able to run arbitrary code as either DefaultAppPool or NetworkService, depending on the operating system version.

Vendor Response

Cisco has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2013-06-21 - Vulnerability reported to vendor
    2013-12-15 - Coordinated public release of advisory


This vulnerability was discovered by:
    Andrea Micalizzi aka rgod