CVE-2022-20784

A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 5.3
v2 : 5.0
v3 : 5.8
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X - Vendor Advisory

Information

Published : 2022-04-06 18:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20784

Mitre link : CVE-2022-20784

CVE.ORG link : CVE-2022-20784


JSON object : View

Products Affected

cisco

  • web_security_appliance
CWE
CWE-20

Improper Input Validation