First published: Sat Jun 13 2015(Updated: )
The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =3.331-09 | |
Cisco Email Security Appliance Firmware | =7.5.1-gpl-022 | |
Cisco Email Security Appliance Firmware | =8.5.6-074 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4184 has a medium severity level that allows remote attackers to bypass e-mail restrictions.
To mitigate CVE-2015-4184, update your Cisco Email Security Appliance to the latest firmware version that addresses this vulnerability.
CVE-2015-4184 affects Cisco Email Security Appliance devices running versions 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074.
Yes, CVE-2015-4184 can allow attackers to bypass intended email restrictions, potentially leading to unauthorized access.
As of the last reports, there have been indications that CVE-2015-4184 could be exploited by attackers using malformed DNS SPF records.