Description
A vulnerability in the Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass the anti-malware scanner, allowing malicious archive files to be downloaded.

This vulnerability is due to improper handling of certain archive files. An attacker could exploit this vulnerability by sending a crafted archive file, which should be blocked, through an affected device. A successful exploit could allow the attacker to bypass the anti-malware scanner and download malware onto an end user workstation. The downloaded malware will not automatically execute unless the end user extracts and launches the malicious file. 
Published: 2026-02-04
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypass of the anti‑malware scanner enabling malicious archive delivery
Action: Apply Patch
AI Analysis

Impact

A flaw in the DVS Engine of Cisco Secure Web Appliance allows an unauthenticated, remote attacker to send a specially crafted archive file that the device fails to scan properly. The compromised anti‑malware scanner can be bypassed, allowing a malicious archive to be downloaded to an end‑user workstation. The malware does not execute automatically; it requires the user to extract and launch the file. This is a classic CWE‑494 problem where code or functionality is unintentionally exposed through improper validation.

Affected Systems

The vulnerable component resides in Cisco AsyncOS Software used in Cisco Secure Web Appliance. Specific affected versions are not disclosed in the advisory, but all installations that include the DVS Engine and its archive handling routine should be considered potentially impacted. Refer to the Cisco advisory for version‑specific guidance.

Risk and Exploitability

The CVSS score of 4 reflects a moderate impact. The EPSS score of less than 1% indicates a very low likelihood of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector remains remote and unauthenticated, requiring the attacker to push a crafted archive through the device. While the risk is moderate, the potential for delivering malware to end users makes it a priority for remediation.

Generated by OpenCVE AI on April 17, 2026 at 23:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware or security patch released by Cisco for Cisco Secure Web Appliance.
  • Re‑configure the appliance to reject or properly validate all archive uploads, ensuring the anti‑malware scanner processes every archive type explicitly.
  • Enable endpoint antivirus scanning and enforce quarantine of downloaded archives until they are verified as safe.

Generated by OpenCVE AI on April 17, 2026 at 23:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Web Appliance
Vendors & Products Cisco
Cisco secure Web Appliance

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass the anti-malware scanner, allowing malicious archive files to be downloaded. This vulnerability is due to improper handling of certain archive files. An attacker could exploit this vulnerability by sending a crafted archive file, which should be blocked, through an affected device. A successful exploit could allow the attacker to bypass the anti-malware scanner and download malware onto an end user workstation. The downloaded malware will not automatically execute unless the end user extracts and launches the malicious file.&nbsp;
Title Cisco Secure Web Appliance TBD Bypass Vulnerability
Weaknesses CWE-494
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}


Subscriptions

Cisco Secure Web Appliance
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-04T16:40:11.391Z

Reserved: 2025-10-08T11:59:15.356Z

Link: CVE-2026-20056

cve-icon Vulnrichment

Updated: 2026-02-04T16:40:08.657Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T17:16:13.927

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:30:15Z

Weaknesses