First published: Mon Jan 13 2020(Updated: )
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Proofpoint Enterprise Protection | <=8.9.22 | |
Proofpoint Enterprise Protection | <=8.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19680 is a file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD) that allows attackers to bypass protection mechanisms.
CVE-2019-19680 has a severity rating of 8.8 (high).
Versions up to and including 8.9.22 and 8.14.2 of Proofpoint Enterprise Protection are affected.
Attackers can exploit CVE-2019-19680 to bypass protection mechanisms related to file extensions, MIME types, virus detection, and journal entries for transmitted files.
To fix CVE-2019-19680, it is recommended to upgrade Proofpoint Enterprise Protection to a patched version (8.9.23 or higher for versions up to 8.9.22, and 8.14.3 or higher for versions up to 8.14.2).