First published: Wed Oct 02 2019(Updated: )
A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | <13.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12706 is a vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA).
The severity of CVE-2019-12706 is high with a CVSS score of 7.5.
CVE-2019-12706 allows an unauthenticated, remote attacker to bypass the configured user filters on an affected device.
To fix CVE-2019-12706, Cisco recommends upgrading the affected software to version 13.5.0 or later.
You can find more information about CVE-2019-12706 on the Cisco Security Advisory website.