Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-20784— Cisco Web Security Appliance Filter Bypass Vulnerability

CVSS 5.8 · Medium EPSS 0.53% · P67
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-20784

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Web Security Appliance Filter Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Web Security Appliance 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Web Security Appliance(WSA)是美国思科(Cisco)公司的一款Web安全设备。该设备提供基于SaaS的访问控制、实时网络报告和追踪、制定安全策略等功能。 Cisco Web Security Appliance (WSA) 存在输入验证错误漏洞,该漏洞源于对插入 URL 的某些字符组合的错误处理。攻击者利用此漏洞可绕过 Web 代理并访问已被策略阻止的 Web 内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Web Security Appliance (WSA) n/a -

II. Public POCs for CVE-2022-20784

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-20784

登录查看更多情报信息。

Same Patch Batch · Cisco · 2022-04-06 · 12 CVEs total

CVE-2022-207559.0 CRITICALCisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
CVE-2022-207549.0 CRITICALCisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
CVE-2022-207568.6 HIGHCisco Identity Services Engine RADIUS Service Denial of Service Vulnerability
CVE-2022-207627.8 HIGHCisco Ultra Cloud Core - Subscriber Microservices Infrastructure Privilege Escalation Vuln
CVE-2022-207746.8 MEDIUMCisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request
CVE-2022-207826.5 MEDIUMCisco Identity Services Engine Sensitive Information Disclosure Vulnerability
CVE-2022-206656.0 MEDIUMCisco StarOS Command Injection Vulnerability
CVE-2022-207415.4 MEDIUMCisco Secure Network Analytics Network Diagrams Application Cross-Site Scripting Vulnerabi
CVE-2022-207635.4 MEDIUMCisco Webex Meetings Java Deserialization Vulnerability
CVE-2022-207815.4 MEDIUMCisco Web Security Appliance Stored Cross-Site Scripting Vulnerability
CVE-2022-206755.3 MEDIUMMultiple Cisco Security Products Simple Network Management Protocol Service Denial of Serv

IV. Related Vulnerabilities

V. Comments for CVE-2022-20784

No comments yet


Leave a comment