Vulnslist

find the latest Cisco vulnerabilities

Cisco Secure Web Appliance Range Request Bypass Vulnerability

cisco-sa-swa-range-bypass-2BsEHYSu · Medium · Published · Updated

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu

Workarounds

There are no workarounds that address this vulnerability. However, administrators can mitigate this vulnerability by disabling the Range Request Forward feature.

Range Request Forward is disabled by default. If Range Request Forward is enabled, administrators can disable it using the steps shown in the following example:

cisco-wsa> rangerequestdownload

Range requests are currently Enabled.
Are you sure you want to change the setting? [N]>
cisco-wsa> Y
cisco-wsa> commit

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment

CVEsCVE-2025-20183
Cisco Bug IDsCSCwk58287
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Secure Web Appliance

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Secure Web Appliance known_affected cisco_csaf CVE-2025-20183 1

Related Products

Product CVE Evidence
Application Visibility and Control (AVC) CVE-2025-20183 Cisco OpenVuln
Cisco Secure Web Appliance CVE-2025-20183 Cisco OpenVuln
Cisco Application Visibility and Control (AVC) CVE-2025-20183 Cisco OpenVuln