First published: Thu Jul 16 2020(Updated: )
A vulnerability in URL filtering of Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to bypass URL filtering on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted, malicious HTTP request to an affected device. A successful exploit could allow the attacker to redirect users to malicious sites.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance | <13.0.1 | |
Cisco Email Security Appliance | >=13.5.0<13.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Content Security Management Appliance vulnerability is CVE-2020-3370.
The severity rating of CVE-2020-3370 is 5.8 (Medium).
CVE-2020-3370 affects Cisco Email Security Appliance versions 13.0.1 and between 13.5.0 to 13.5.1.
CVE-2020-3370 is a vulnerability in URL filtering of Cisco Content Security Management Appliance that could allow an unauthenticated, remote attacker to bypass URL filtering on an affected device due to insufficient input validation.
The CVE-2020-3370 vulnerability can be exploited by sending a crafted request to the affected device.