Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on April 09, 2022, 06:02:29 AM

Title: Cisco Security Advisory - Cisco Web Security Appliance Filter Bypass Vulnerability
Post by: Netwörkheäd on April 09, 2022, 06:02:29 AM
Cisco Web Security Appliance Filter Bypass Vulnerability

<p>A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco&nbsp;AsyncOS Software for Cisco&nbsp;Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device.</p>
<p>This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X</a></p>

     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2022-20784
Source: Cisco Web Security Appliance Filter Bypass Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Web%20Security%20Appliance%20Filter%20Bypass%20Vulnerability&vs_k=1)