Cisco Security Advisory - Cisco Web Security Appliance Filter Bypass Vulnerability

Started by Netwörkheäd, April 09, 2022, 06:02:29 AM

Previous topic - Next topic

Netwörkheäd

Cisco Web Security Appliance Filter Bypass Vulnerability

<p>A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco&nbsp;AsyncOS Software for Cisco&nbsp;Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device.</p>
<p>This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X</a></p>

     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2022-20784
Source: Cisco Web Security Appliance Filter Bypass Vulnerability
Let's not argue. Let's network!