First published: Wed Feb 05 2025(Updated: )
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint. The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20183 has been classified with a high severity due to its potential impact on system security.
To fix CVE-2025-20183, you should apply the latest updates provided by Cisco for the Cisco Secure Web Appliance.
CVE-2025-20183 can be exploited by an unauthenticated remote attacker to evade antivirus scanning.
CVE-2025-20183 affects implementations of Cisco AsyncOS Software on Cisco Secure Web Appliance.
No, authentication is not required for an attacker to exploit CVE-2025-20183.