QID 317338

Date Published: 2023-08-10

QID 317338: Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability (cisco-sa-wsa-bypass-vXvqwzsj)

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

Affected Products
Prior to Cisco Secure Web Appliance version 14.5.1-017

The Qid checks for the Vulnerable version of Cisco WSA and SMA in the response of "version" command.
Note: This QID does not checks for the content-encoding, hence kept as practice

Successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-wsa-bypass-vXvqwzsj for more information.

    CVEs related to QID 317338

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-wsa-bypass-vXvqwzsj URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj