Логотип exploitDog
bind:CVE-2019-1672
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1672

Количество 3

Количество 3

nvd логотип

CVE-2019-1672

около 7 лет назад

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-xgwc-rmqj-wxqr

больше 3 лет назад

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2019-00740

около 7 лет назад

Уязвимость компонента Decryption Policy Default Action интернет-шлюзов Cisco Web Security Appliance, позволяющая нарушителю заблокировать определённые SSL-соединения

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1672

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

CVSS3: 5.8
0%
Низкий
около 7 лет назад
github логотип
GHSA-xgwc-rmqj-wxqr

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

CVSS3: 5.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00740

Уязвимость компонента Decryption Policy Default Action интернет-шлюзов Cisco Web Security Appliance, позволяющая нарушителю заблокировать определённые SSL-соединения

CVSS3: 5.8
0%
Низкий
около 7 лет назад

Уязвимостей на страницу