First published: Thu Jan 26 2017(Updated: )
A vulnerability in the content scanning engine of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured message or content filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz16076. Known Affected Releases: 9.7.1-066 9.7.1-HP2-207 9.8.5-085. Known Fixed Releases: 10.0.1-083 10.0.1-087.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =9.7.1-066 | |
Cisco Email Security Appliance Firmware | =9.7.1-hp2-207 | |
Cisco Email Security Appliance Firmware | =9.8.5-085 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3800 has a medium severity rating that can allow unauthorized access to bypass configured filters.
To fix CVE-2017-3800, update the Cisco Email Security Appliance to a patched version as recommended by Cisco.
CVE-2017-3800 affects Cisco Email Security Appliance firmware versions prior to the fixes released in 9.7.1-067 and 9.8.5-086.
Yes, CVE-2017-3800 can be exploited remotely by an unauthenticated attacker.
CVE-2017-3800 allows attackers to bypass message and content filters, which undermines email security protocols.