Cisco Security Advisory - Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability

Started by Netwörkheäd, February 24, 2023, 06:47:44 AM

Previous topic - Next topic

Netwörkheäd

Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.


This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.


This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek


Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure.



     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2022-20952
Source: Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability
Let's not argue. Let's network!