A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-02-05 17:15
Updated : 2025-08-05 19:28
NVD link : CVE-2025-20183
Mitre link : CVE-2025-20183
CVE.ORG link : CVE-2025-20183
JSON object : View
Products Affected
cisco
- secure_web_appliance_s396
- secure_web_appliance_virtual_s1000v
- secure_web_appliance_virtual_s300v
- secure_web_appliance_s196
- secure_web_appliance_virtual_s600v
- secure_web_appliance_s696
- secure_web_appliance_virtual_s100v
- asyncos
CWE
