First published: Wed Apr 20 2022(Updated: )
A vulnerability in the automatic decryption process in Cisco Umbrella Secure Web Gateway (SWG) could allow an authenticated, adjacent attacker to bypass the SSL decryption and content filtering policies on an affected system. This vulnerability is due to how the decryption function uses the TLS Sever Name Indication (SNI) extension of an HTTPS request to discover the destination domain and determine if the request needs to be decrypted. An attacker could exploit this vulnerability by sending a crafted request over TLS from a client to an unknown or controlled URL. A successful exploit could allow an attacker to bypass the decryption process of Cisco Umbrella SWG and allow malicious content to be downloaded to a host on a protected network. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uswg-fdbps-xtTRKpp6
Credit: the security researchers Alexandre Samuel AxiansDamien Foulde Axians
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-uswg-fdbps-xtTRKpp6 vulnerability is considered to have a high severity due to the potential for an attacker to bypass SSL decryption and content filtering.
To mitigate the cisco-sa-uswg-fdbps-xtTRKpp6 vulnerability, ensure you apply the latest patches and updates from Cisco for the Umbrella Secure Web Gateway.
Organizations using the Cisco Umbrella Secure Web Gateway are affected by the cisco-sa-uswg-fdbps-xtTRKpp6 vulnerability.
An authenticated adjacent attacker can exploit cisco-sa-uswg-fdbps-xtTRKpp6 to bypass SSL decryption and content filtering policies.
Yes, an authenticated user must be present for the exploitation of the cisco-sa-uswg-fdbps-xtTRKpp6 vulnerability.