First published: Mon Nov 18 2024(Updated: )
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Security Management Virtual Appliance | ||
Cisco Email Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1425 is rated as a high severity vulnerability due to its potential to allow unauthorized access to sensitive information.
To fix CVE-2021-1425, update your Cisco AsyncOS Software to the latest version provided by Cisco.
CVE-2021-1425 affects the Cisco Content Security Management Appliance and the Cisco Email Security Appliance.
No, CVE-2021-1425 requires an authenticated remote attacker to exploit the vulnerability.
CVE-2021-1425 may allow attackers to access sensitive information stored within the affected devices.