First published: Tue Jun 13 2017(Updated: )
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device, as demonstrated by the Attachment Filter. More Information: CSCvd34632. Known Affected Releases: 10.0.1-087 9.7.1-066. Known Fixed Releases: 10.0.2-020 9.8.1-015.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =9.7.1-066 | |
Cisco Email Security Appliance Firmware | =10.0.1-087 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6671 is rated as a high severity vulnerability allowing attackers to bypass filters.
To fix CVE-2017-6671, upgrade the Cisco Email Security Appliance firmware to a version that addresses the vulnerability.
The affected software versions for CVE-2017-6671 include Cisco Email Security Appliance firmware versions 9.7.1-066 and 10.0.1-087.
Yes, CVE-2017-6671 can be exploited by an unauthenticated remote attacker.
CVE-2017-6671 involves an attack that bypasses configured email message scanning filters.