Логотип exploitDog
bind:CVE-2023-20215
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20215

Количество 3

Количество 3

nvd логотип

CVE-2023-20215

больше 2 лет назад

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-4qcp-whvm-5mwc

больше 2 лет назад

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2023-04415

больше 2 лет назад

Уязвимость механизма сканирования операционной системы Cisco AsyncOS для Cisco Secure Web Appliance, позволяющая нарушителю обойти правила блокировки трафика

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20215

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 5.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-4qcp-whvm-5mwc

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

CVSS3: 5.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-04415

Уязвимость механизма сканирования операционной системы Cisco AsyncOS для Cisco Secure Web Appliance, позволяющая нарушителю обойти правила блокировки трафика

CVSS3: 8.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу