fkie_cve-2023-20215
Vulnerability from fkie_nvd
Published
2023-08-03 22:15
Modified
2024-11-21 07:40
Summary
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
Impacted products
Vendor Product Version
cisco asyncos 11.7.0-406
cisco asyncos 11.7.0-418
cisco asyncos 11.7.1-006
cisco asyncos 11.7.1-020
cisco asyncos 11.7.1-049
cisco asyncos 11.7.2-011
cisco asyncos 11.8.0-414
cisco asyncos 11.8.1-023
cisco asyncos 11.8.3-018
cisco asyncos 11.8.3-021
cisco asyncos 12.0.1-268
cisco asyncos 12.0.3-007
cisco asyncos 12.5.1-011
cisco asyncos 12.5.2-007
cisco asyncos 12.5.4-005
cisco asyncos 12.5.5-004
cisco asyncos 14.0.2-012
cisco asyncos 14.0.3-014
cisco asyncos 14.0.4-005
cisco asyncos 14.5.0-498
cisco asyncos 14.5.1-008
cisco asyncos 14.5.1-016
cisco s195 -
cisco s395 -
cisco s695 -
cisco web_security_appliance_s170 -
cisco web_security_appliance_s190 -
cisco web_security_appliance_s380 -
cisco web_security_appliance_s390 -
cisco web_security_appliance_s680 -
cisco web_security_appliance_s690 -
cisco web_security_appliance_s690x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*",
              "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*",
              "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*",
              "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*",
              "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E401F29A-026F-4097-B513-47911CB3AA09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3B097B-F689-4886-A0C6-B71ECAD783CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23C3AECC-9270-42B5-A36E-208AA0B48D93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5290B9CF-CF7D-4762-B5EE-5DAEA03C6409",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE85462C-079B-4488-AB0E-989D41EB7AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A8E5E8-8361-4BC8-BFA9-CAE4745A9C48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEAFE16-BD4F-4538-9A06-173FB678DB8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device."
    }
  ],
  "id": "CVE-2023-20215",
  "lastModified": "2024-11-21T07:40:54.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-03T22:15:11.513",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-202"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.