First published: Fri Feb 03 2017(Updated: )
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device, aka a Malformed MIME Header Filtering Bypass. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. More Information: CSCvb65245. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 9.8.0-092.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance | =9.7.1-066 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3818 is rated as a high severity vulnerability due to its potential to allow unauthorized access to filtered content.
To mitigate CVE-2017-3818, upgrade to the latest version of Cisco Email Security Appliance firmware that addresses this vulnerability.
CVE-2017-3818 can facilitate an attack that allows an unauthenticated remote attacker to bypass user-configured filters on the Cisco Email Security Appliance.
CVE-2017-3818 specifically affects the Cisco Email Security Appliance running firmware version 9.7.1-066.
No, CVE-2017-3818 can be exploited by an unauthenticated remote attacker, which increases its risk profile.