A vulnerability in the URL filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured URL filter rule. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), both virtual and hardware appliances, that are configured with URL filters for email scanning. More Information: CSCvc69700. Known Affected Releases: 8.5.3-069 9.1.1-074 9.1.2-010.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wsa | Vendor Advisory |
http://www.securityfocus.com/bid/96907 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038043 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-03-17 15:59
Updated : 2017-07-11 18:29
NVD link : CVE-2017-3870
Mitre link : CVE-2017-3870
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
cisco
- web_security_appliance