A vulnerability in the scanning engines of Cisco AsyncOS...
Moderate severity
Unreviewed
Published
Aug 4, 2023
to the GitHub Advisory Database
•
Updated Feb 3, 2024
Description
Published by the National Vulnerability Database
Aug 3, 2023
Published to the GitHub Advisory Database
Aug 4, 2023
Last updated
Feb 3, 2024
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.
This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
References