{"containers":{"cna":{"affected":[{"product":"Cisco Umbrella Insights Virtual Appliance","vendor":"Cisco","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2022-02-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload."}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept is available for the vulnerability that is described in this advisory."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-693","description":"CWE-693","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-10T17:06:22.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"20220203 Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p"}],"source":{"advisory":"cisco-sa-swg-fbyps-3z4qT7p","defect":[["CSCwa01047"]],"discovery":"INTERNAL"},"title":"Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","DATE_PUBLIC":"2022-02-03T00:00:00","ID":"CVE-2022-20738","STATE":"PUBLIC","TITLE":"Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cisco Umbrella Insights Virtual Appliance","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"Cisco"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload."}]},"exploit":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept is available for the vulnerability that is described in this advisory."}],"impact":{"cvss":{"baseScore":"5.8","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-693"}]}]},"references":{"reference_data":[{"name":"20220203 Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p"}]},"source":{"advisory":"cisco-sa-swg-fbyps-3z4qT7p","defect":[["CSCwa01047"]],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:24:49.429Z"},"title":"CVE Program Container","references":[{"name":"20220203 Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-06T16:01:56.876709Z","id":"CVE-2022-20738","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-06T16:32:14.413Z"}}]},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2022-20738","datePublished":"2022-02-10T17:06:22.507Z","dateReserved":"2021-11-02T00:00:00.000Z","dateUpdated":"2024-11-06T16:32:14.413Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}