Vulnslist

find the latest Cisco vulnerabilities

Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability

cisco-sa-wsa-bypass-vXvqwzsj · Medium · Published · Updated

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj

Workarounds

There are no workarounds that address this vulnerability. However, administrators can mitigate this vulnerability in one of two ways:

Disable the deflate, lzma, and brotli content-encoding types if they are not required.
Migrate to Cisco Secure Web Appliance Release 14.5.2, in which deflate, lzma, and brotli content-encoding types are disabled by default.

Disable the Content-Encoding Type

To disable a specific content-encoding type, use the following steps:

Log in to the admin console interface for the device.
Choose advancedproxyconfig > CONTENT-ENCODING.
Enter the number associated with the specific content-encoding type.
If the following message is displayed, enter Y at the prompt:

The encoding type <"content-encoding type"> is currently allowed
Do you want to block it? [N]> Y
If the following message is displayed, enter N at the prompt:

The encoding type <"content-encoding type"> is currently blocked
Do you want to allow it? [N]> N

Run the Commit command.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2023-20215
Cisco Bug IDsCSCwf60901, CSCwf55917, CSCwf94501
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Secure Web Appliance

Related Products

Product CVE Evidence
Cisco Secure Web Appliance CVE-2023-20215 Cisco OpenVuln