SB2022100610 - Content Encoding Filter Bypass in Cisco AsyncOS for Web Security Appliances



SB2022100610 - Content Encoding Filter Bypass in Cisco AsyncOS for Web Security Appliances

Published: October 6, 2022

Security Bulletin ID SB2022100610
Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2022-20952)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient validation of user-supplied input in the scanning engines. A remote attacker can bypass an explicit block rule and receive traffic that should have been rejected by the device.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.