Lucene search

K
ciscoCiscoCISCO-SA-20170315-WSA
HistoryMar 15, 2017 - 4:00 p.m.

Cisco Web Security Appliance URL Filtering Bypass Vulnerability

2017-03-1516:00:00
tools.cisco.com
30

0.001 Low

EPSS

Percentile

51.0%

A vulnerability in the URL filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured URL filter rule.

The vulnerability is due to incomplete validation of the HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request through the targeted device. An exploit could allow the attacker to bypass a configured URL filter.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wsa [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wsa”]

Affected configurations

Vulners
Node
ciscoweb_security_appliance_\(wsa\)Matchany
OR
ciscoweb_security_appliance_\(wsa\)Matchany

0.001 Low

EPSS

Percentile

51.0%

Related for CISCO-SA-20170315-WSA