Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qcp-whvm-5mwc

Опубликовано: 04 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-202

Связанные уязвимости

CVSS3: 5.8
nvd
больше 2 лет назад

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 8.6
fstec
больше 2 лет назад

Уязвимость механизма сканирования операционной системы Cisco AsyncOS для Cisco Secure Web Appliance, позволяющая нарушителю обойти правила блокировки трафика

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-202