Логотип exploitDog
bind:CVE-2025-20183
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20183

Количество 3

Количество 3

nvd логотип

CVE-2025-20183

около 1 года назад

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-6fqv-9m7r-mcwr

около 1 года назад

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2025-01620

около 1 года назад

Уязвимость функции Range Request Forward операционной системы Cisco AsyncOS интернет-шлюзов Cisco Secure Web Appliance, позволяющая нарушителю обойти ограничения безопасности и записывать произвольные файлы

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20183

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

CVSS3: 5.8
0%
Низкий
около 1 года назад
github логотип
GHSA-6fqv-9m7r-mcwr

A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.  The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.

CVSS3: 5.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-01620

Уязвимость функции Range Request Forward операционной системы Cisco AsyncOS интернет-шлюзов Cisco Secure Web Appliance, позволяющая нарушителю обойти ограничения безопасности и записывать произвольные файлы

CVSS3: 5.8
0%
Низкий
около 1 года назад

Уязвимостей на страницу