[CIVN-2026-0069] File Bypass vulnerability in CISCO

By Published On: February 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
File Bypass vulnerability in CISCO 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
Cisco Secure Web Appliance
Overview
A vulnerability has been reported in Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass the anti-malware scanner, allowing malicious archive files to be downloaded.
Target Audience: 
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to improper handling of certain archive files. An attacker could exploit this vulnerability by sending a crafted archive file, which should be blocked, through an affected device.
Successful exploitation of this vulnerability could allow the attacker to bypass the anti-malware scanner and download malware onto an end user workstation.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-archive-bypass-Scx2e8zF
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-archive-bypass-Scx2e8zF
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-archive-bypass-Scx2e8zF
CVE Name
CVE-2026-20056
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=Vi2J
—–END PGP SIGNATURE—–

Share this article