QID 317245

Date Published: 2022-10-13

QID 317245: Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability (cisco-sa-wsa-bypass-bwBfugek)

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.

Affected Products
Cisco Secure Web Appliance version 14.0.1-053

The Qid checks for the Vulnerable version of Cisco WSA and SMA in the response of "version" command.

A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution

    Customers are advised to refer to cisco-sa-wsa-prv-esc-8PdRU8t8 for more information.

    CVEs related to QID 317245

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-wsa-bypass-bwBfugek URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek