Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6fqv-9m7r-mcwr

Опубликовано: 05 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint. 

The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint. 

The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

EPSS

Процентиль: 35%
0.00147
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 5.8
nvd
около 1 года назад

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

CVSS3: 5.8
fstec
около 1 года назад

Уязвимость функции Range Request Forward операционной системы Cisco AsyncOS интернет-шлюзов Cisco Secure Web Appliance, позволяющая нарушителю обойти ограничения безопасности и записывать произвольные файлы

EPSS

Процентиль: 35%
0.00147
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-20