First published: Wed Mar 04 2020(Updated: )
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific HTTP request headers. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to trigger a prolonged status of high CPU utilization relative to the GUI process(es). Upon successful exploitation of this vulnerability, an affected device will still be operative, but its response time and overall performance may be degraded.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Cloud Email Security | <=13.0.0-392 | |
Cisco Content Security Management Appliance | <13.6.0 | |
Cisco Email Security Appliance | <=13.0.0-392 | |
Cisco Web Security Appliance | <=12.0.1-268 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3164 is a vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Security Management Appliance (SMA) that could allow an unauthenticated remote attacker to cause high CPU usage on an affected device.
Cisco Cloud Email Security, Cisco Content Security Management Appliance, Cisco Email Security Appliance, and Cisco Web Security Appliance are affected by CVE-2020-3164.
CVE-2020-3164 could cause high CPU usage on the affected devices.
CVE-2020-3164 has a severity score of 5.3, which is considered medium.
To fix CVE-2020-3164, Cisco recommends upgrading to the fixed software versions mentioned in the Cisco Security Advisory.