CVE-2023-20215
03.08.2023, 22:15
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | asyncos | 11.7.0-406 |
cisco | asyncos | 11.7.0-418 |
cisco | asyncos | 11.7.1-006 |
cisco | asyncos | 11.7.1-020 |
cisco | asyncos | 11.7.1-049 |
cisco | asyncos | 11.7.2-011 |
cisco | asyncos | 11.8.0-414 |
cisco | asyncos | 11.8.1-023 |
cisco | asyncos | 11.8.3-018 |
cisco | asyncos | 11.8.3-021 |
cisco | asyncos | 12.0.1-268 |
cisco | asyncos | 12.0.3-007 |
cisco | asyncos | 12.5.1-011 |
cisco | asyncos | 12.5.2-007 |
cisco | asyncos | 12.5.4-005 |
cisco | asyncos | 12.5.5-004 |
cisco | asyncos | 14.0.2-012 |
cisco | asyncos | 14.0.3-014 |
cisco | asyncos | 14.0.4-005 |
cisco | asyncos | 14.5.0-498 |
cisco | asyncos | 14.5.1-008 |
cisco | asyncos | 14.5.1-016 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration