Lucene search

K
nvd[email protected]NVD:CVE-2023-20215
HistoryAug 03, 2023 - 10:15 p.m.

CVE-2023-20215

2023-08-0322:15:11
CWE-202
web.nvd.nist.gov
10
cisco secure web appliance
vulnerability
bypassing block rule
http
remote attacker
malicious traffic

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

35.2%

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.

This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

Affected configurations

Nvd
Node
ciscoasyncosMatch11.7.0-406
OR
ciscoasyncosMatch11.7.0-418
OR
ciscoasyncosMatch11.7.1-006
OR
ciscoasyncosMatch11.7.1-020
OR
ciscoasyncosMatch11.7.1-049
OR
ciscoasyncosMatch11.7.2-011
OR
ciscoasyncosMatch11.8.0-414
OR
ciscoasyncosMatch11.8.1-023
OR
ciscoasyncosMatch11.8.3-018
OR
ciscoasyncosMatch11.8.3-021
OR
ciscoasyncosMatch12.0.1-268
OR
ciscoasyncosMatch12.0.3-007
OR
ciscoasyncosMatch12.5.1-011
OR
ciscoasyncosMatch12.5.2-007
OR
ciscoasyncosMatch12.5.4-005
OR
ciscoasyncosMatch12.5.5-004
OR
ciscoasyncosMatch14.0.2-012
OR
ciscoasyncosMatch14.0.3-014
OR
ciscoasyncosMatch14.0.4-005
OR
ciscoasyncosMatch14.5.0-498
OR
ciscoasyncosMatch14.5.1-008
OR
ciscoasyncosMatch14.5.1-016
AND
ciscos195Match-
OR
ciscos395Match-
OR
ciscos695Match-
OR
ciscoweb_security_appliance_s170Match-
OR
ciscoweb_security_appliance_s190Match-
OR
ciscoweb_security_appliance_s380Match-
OR
ciscoweb_security_appliance_s390Match-
OR
ciscoweb_security_appliance_s680Match-
OR
ciscoweb_security_appliance_s690Match-
OR
ciscoweb_security_appliance_s690xMatch-
VendorProductVersionCPE
ciscoasyncos11.7.0-406cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*
ciscoasyncos11.7.0-418cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*
ciscoasyncos11.7.1-006cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*
ciscoasyncos11.7.1-020cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*
ciscoasyncos11.7.1-049cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*
ciscoasyncos11.7.2-011cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*
ciscoasyncos11.8.0-414cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*
ciscoasyncos11.8.1-023cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*
ciscoasyncos11.8.3-018cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*
ciscoasyncos11.8.3-021cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*
Rows per page:
1-10 of 321

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

35.2%

Related for NVD:CVE-2023-20215