Lucene search

K
cve[email protected]CVE-2023-20215
HistoryAug 03, 2023 - 10:15 p.m.

CVE-2023-20215

2023-08-0322:15:11
CWE-202
web.nvd.nist.gov
36
cve-2023-20215
cisco
asyncos software
vulnerability
scanning engines
network security
unauthenticated
remote attacker
bypass rule
traffic
malicious traffic
http responses
nvd

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.3%

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

Affected configurations

NVD
Node
ciscoasyncosMatch11.7.0-406
OR
ciscoasyncosMatch11.7.0-418
OR
ciscoasyncosMatch11.7.1-006
OR
ciscoasyncosMatch11.7.1-020
OR
ciscoasyncosMatch11.7.1-049
OR
ciscoasyncosMatch11.7.2-011
OR
ciscoasyncosMatch11.8.0-414
OR
ciscoasyncosMatch11.8.1-023
OR
ciscoasyncosMatch11.8.3-018
OR
ciscoasyncosMatch11.8.3-021
OR
ciscoasyncosMatch12.0.1-268
OR
ciscoasyncosMatch12.0.3-007
OR
ciscoasyncosMatch12.5.1-011
OR
ciscoasyncosMatch12.5.2-007
OR
ciscoasyncosMatch12.5.4-005
OR
ciscoasyncosMatch12.5.5-004
OR
ciscoasyncosMatch14.0.2-012
OR
ciscoasyncosMatch14.0.3-014
OR
ciscoasyncosMatch14.0.4-005
OR
ciscoasyncosMatch14.5.0-498
OR
ciscoasyncosMatch14.5.1-008
OR
ciscoasyncosMatch14.5.1-016
AND
ciscos195Match-
OR
ciscos395Match-
OR
ciscos695Match-
OR
ciscoweb_security_appliance_s170Match-
OR
ciscoweb_security_appliance_s190Match-
OR
ciscoweb_security_appliance_s380Match-
OR
ciscoweb_security_appliance_s390Match-
OR
ciscoweb_security_appliance_s680Match-
OR
ciscoweb_security_appliance_s690Match-
OR
ciscoweb_security_appliance_s690xMatch-

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Secure Web Appliance",
    "versions": [
      {
        "version": "11.7.0-406",
        "status": "affected"
      },
      {
        "version": "11.7.0-418",
        "status": "affected"
      },
      {
        "version": "11.7.1-049",
        "status": "affected"
      },
      {
        "version": "11.7.1-006",
        "status": "affected"
      },
      {
        "version": "11.7.1-020",
        "status": "affected"
      },
      {
        "version": "11.7.2-011",
        "status": "affected"
      },
      {
        "version": "11.8.0-414",
        "status": "affected"
      },
      {
        "version": "11.8.1-023",
        "status": "affected"
      },
      {
        "version": "11.8.3-018",
        "status": "affected"
      },
      {
        "version": "11.8.3-021",
        "status": "affected"
      },
      {
        "version": "12.0.1-268",
        "status": "affected"
      },
      {
        "version": "12.0.3-007",
        "status": "affected"
      },
      {
        "version": "12.5.2-007",
        "status": "affected"
      },
      {
        "version": "12.5.1-011",
        "status": "affected"
      },
      {
        "version": "12.5.4-005",
        "status": "affected"
      },
      {
        "version": "12.5.5-004",
        "status": "affected"
      },
      {
        "version": "14.5.0-498",
        "status": "affected"
      },
      {
        "version": "14.5.1-016",
        "status": "affected"
      },
      {
        "version": "14.0.3-014",
        "status": "affected"
      },
      {
        "version": "14.0.2-012",
        "status": "affected"
      },
      {
        "version": "14.0.4-005",
        "status": "affected"
      }
    ]
  }
]

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.3%

Related for CVE-2023-20215