First published: Thu Jun 23 2016(Updated: )
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software | =9.7.0-125 | |
Cisco Email Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1438 has a medium severity rating, which indicates potential for exploitation that could lead to spam filtering bypass.
To fix CVE-2016-1438, upgrade to a later version of Cisco AsyncOS that resolves this vulnerability.
CVE-2016-1438 affects Cisco AsyncOS version 9.7.0-125 on Email Security Appliance devices.
Yes, CVE-2016-1438 can be exploited remotely by attackers to bypass spam filtering.
CVE-2016-1438 allows attackers to deliver crafted executable content in ZIP archives that can evade spam filters.