First published: Wed Feb 02 2022(Updated: )
A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p
Credit: Yosi Magor security researcher at ThriveDX Labs .
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-swg-fbyps-3z4qT7p is high due to the potential for unauthenticated remote access and file inspection bypass.
To fix cisco-sa-swg-fbyps-3z4qT7p, ensure that you update your Cisco Umbrella Secure Web Gateway to the latest version following Cisco's security advisory.
The impact of cisco-sa-swg-fbyps-3z4qT7p includes the possibility for attackers to bypass security controls and gain unauthorized access to network resources.
Organizations using the Cisco Umbrella Secure Web Gateway service are affected by cisco-sa-swg-fbyps-3z4qT7p.
Exploitation of cisco-sa-swg-fbyps-3z4qT7p is relatively easy as it can be performed by an unauthenticated remote attacker.