Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-20215

Опубликовано: 03 авг. 2023
Источник: nvd
CVSS3: 5.8
CVSS3: 5.3
EPSS Низкий

Описание

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

5.3 Medium

CVSS3

Дефекты

CWE-202
NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 5.8
github
больше 2 лет назад

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 8.6
fstec
больше 2 лет назад

Уязвимость механизма сканирования операционной системы Cisco AsyncOS для Cisco Secure Web Appliance, позволяющая нарушителю обойти правила блокировки трафика

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

5.3 Medium

CVSS3

Дефекты

CWE-202
NVD-CWE-noinfo