First published: Fri Mar 17 2017(Updated: )
A vulnerability in the URL filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured URL filter rule. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), both virtual and hardware appliances, that are configured with URL filters for email scanning. More Information: CSCvc69700. Known Affected Releases: 8.5.3-069 9.1.1-074 9.1.2-010.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =8.5.3-069 | |
Cisco Web Security Appliance | =9.1.1-074 | |
Cisco Web Security Appliance | =9.1.2-010 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3870 is classified as a high-severity vulnerability due to its potential to allow unauthorized access to URL filtering features.
To fix CVE-2017-3870, upgrade your Cisco Web Security Appliance to a release that includes the first fixed release from Cisco.
CVE-2017-3870 affects all Cisco Web Security Appliance versions prior to the first fixed release, specifically those under versions 8.5.3-069, 9.1.1-074, and 9.1.2-010.
The impact of CVE-2017-3870 is that it allows unauthenticated remote attackers to bypass configured URL filter rules, potentially exposing sensitive web content.
CVE-2017-3870 was publicly disclosed on March 15, 2017, when Cisco released an advisory regarding the vulnerability.