QID 317245
Date Published: 2022-10-13
QID 317245: Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability (cisco-sa-wsa-bypass-bwBfugek)
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.
Affected Products
Cisco Secure Web Appliance version 14.0.1-053
The Qid checks for the Vulnerable version of Cisco WSA and SMA in the response of "version" command.
A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
Solution
Customers are advised to refer to cisco-sa-wsa-prv-esc-8PdRU8t8 for more information.
Vendor References
- cisco-sa-wsa-bypass-bwBfugek -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek
CVEs related to QID 317245
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-wsa-bypass-bwBfugek |
|