Vulnslist

find the latest Cisco vulnerabilities

Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerabilities

cisco-sa-wsa-bypass-bwBfugek · Medium · Published · Updated

Multiple vulnerabilities in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.  These vulnerabilities exist because malformed, encoded traffic is not properly detected. An attacker could exploit these vulnerabilities by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure.

Workarounds

There are no workarounds that address these vulnerabilities.

CVEsCVE-2022-20952, CVE-2023-20099
Cisco Bug IDsCSCwe16408, CSCwc54898
CVSS ScoreBase 5.3
Base 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Secure Web Appliance

Related Products

Product CVE Evidence
Cisco Web Security Appliance (WSA) CVE-2023-20099 Cisco OpenVuln
Cisco Web Security Appliance (WSA) CVE-2022-20952 Cisco OpenVuln
Cisco Secure Web Appliance CVE-2023-20099 Cisco OpenVuln
Cisco Secure Web Appliance CVE-2022-20952 Cisco OpenVuln