First published: Fri Oct 28 2016(Updated: )
A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance | =8.9.0 | |
Cisco Email Security Appliance | =8.9.1-000 | |
Cisco Email Security Appliance | =8.9.2-032 | |
Cisco Email Security Appliance | =9.0.0 | |
Cisco Email Security Appliance | =9.0.0-212 | |
Cisco Email Security Appliance | =9.0.0-461 | |
Cisco Email Security Appliance | =9.0.5-000 | |
Cisco Email Security Appliance | =9.1.0 | |
Cisco Email Security Appliance | =9.1.0-011 | |
Cisco Email Security Appliance | =9.1.0-032 | |
Cisco Email Security Appliance | =9.1.0-101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.