A vulnerability in the URL filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured URL filter rule. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), both virtual and hardware appliances, that are configured with URL filters for email scanning. More Information: CSCvc69700. Known Affected Releases: 8.5.3-069 9.1.1-074 9.1.2-010.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96907 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038043 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wsa | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-17 22:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-3870
Mitre link : CVE-2017-3870
CVE.ORG link : CVE-2017-3870
JSON object : View
Products Affected
cisco
- web_security_appliance
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer