QID 317338
Date Published: 2023-08-10
QID 317338: Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability (cisco-sa-wsa-bypass-vXvqwzsj)
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.
Affected Products
Prior to Cisco Secure Web Appliance version 14.5.1-017
The Qid checks for the Vulnerable version of Cisco WSA and SMA in the response of "version" command.
Note: This QID does not checks for the content-encoding, hence kept as practice
Successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
Solution
Customers are advised to refer to cisco-sa-wsa-bypass-vXvqwzsj for more information.
Vendor References
- cisco-sa-wsa-bypass-vXvqwzsj -
sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj
CVEs related to QID 317338
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-wsa-bypass-vXvqwzsj |
|