First published: Wed Aug 02 2023(Updated: )
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.This vulnerability is due to improper detection
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-wsa-bypass-vXvqwzsj is classified as high due to its potential to allow unauthorized access to the network.
To fix cisco-sa-wsa-bypass-vXvqwzsj, update your Cisco Secure Web Appliance to the latest version recommended by Cisco.
Organizations using Cisco Secure Web Appliance with affected versions of AsyncOS software are at risk due to cisco-sa-wsa-bypass-vXvqwzsj.
cisco-sa-wsa-bypass-vXvqwzsj facilitates an unauthenticated remote attack that can bypass security rules, allowing unauthorized traffic.
No, authentication is not required to exploit cisco-sa-wsa-bypass-vXvqwzsj, making it particularly dangerous.