First published: Thu Feb 08 2018(Updated: )
A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software for Cisco Email Security Appliances | =9.8.0-112 | |
Cisco AsyncOS Software for Cisco Email Security Appliances | =10.0.1-087 | |
Cisco AsyncOS Software for Cisco Email Security Appliances | =11.0.0-274 | |
Cisco AsyncOS Software for Cisco Email Security Appliances | ||
Cisco AsyncOS Software for Cisco Email Security Appliances | ||
Cisco Email Security Appliance | ||
Cisco Email Security Appliance | ||
Cisco Email Security Appliance | ||
Cisco AsyncOS Software for Cisco Email Security Appliances | ||
Cisco Email Security Appliance | ||
Cisco Email Security Appliance | ||
Cisco Email Security Appliance C680 | ||
Cisco Email Security Appliance C690 | ||
Cisco Email Security Appliance | ||
Cisco Email Security Appliance | ||
Cisco Content Security Management | =10.0.0-096 | |
Cisco Content Security Management | =10.1.0-037 | |
Cisco Content Security Management | =10.1.0-052 | |
Cisco Content Security Management | =11.0.0-115 | |
Cisco Content Security Management Appliance SMA M190 | ||
Cisco Content Security Management Appliance SMA M390 | ||
Cisco Content Security Management Appliance SMA M390X | ||
Cisco Content Security Management Appliance (SMA) M690 | ||
Cisco Content Security Management Appliance M690X |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0140 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2018-0140 by modifying browser string information to download any message from the spam quarantine in Cisco Email Security Appliance and Cisco Content Security Management Appliance.
Versions 9.8.0-112, 10.0.1-087, and 11.0.0-274 of Cisco Email Security Appliance are affected by CVE-2018-0140.
Versions 10.0.0-096, 10.1.0-037, 10.1.0-052, and 11.0.0-115 of Cisco Content Security Management Appliance are affected by CVE-2018-0140.
No, the Cisco Email Security Appliance C160, C170, C190, C370, C370d, C380, C390, C670, C680, C690, C690x, and X1070 are not vulnerable to CVE-2018-0140.