First published: Thu Sep 21 2017(Updated: )
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software | =9.0 | |
Cisco AsyncOS Software | =9.1 | |
Cisco AsyncOS Software | =9.1.2 | |
Cisco AsyncOS Software | =9.5 | |
Cisco AsyncOS Software | =9.6 | |
Cisco AsyncOS Software | =9.7 | |
Cisco AsyncOS Software | =9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12215 has been classified with a medium severity score due to its potential to cause service disruption.
To mitigate CVE-2017-12215, users should upgrade their Cisco AsyncOS to the latest version provided by Cisco.
CVE-2017-12215 affects Cisco AsyncOS versions 9.0, 9.1, 9.1.2, 9.5, 9.6, 9.7, and 9.8.
If exploited, CVE-2017-12215 can allow attackers to consume system memory, leading to a halt in email scanning and forwarding.
CVE-2017-12215 can be exploited by unauthenticated remote attackers, making it particularly concerning for affected systems.