First published: Wed Apr 06 2022(Updated: )
A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | >=14.0<14.02.0-020 | |
Cisco Email Security Appliance | ||
Cisco AsyncOS | >=12.5<14.1.0-239 | |
Cisco Secure Email and Web Manager | ||
Cisco AsyncOS | >=12.0<14.0.2-012 | |
Cisco Web Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20675.
This vulnerability affects Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager.
The severity of CVE-2022-20675 is medium with a CVSS score of 5.3.
An unauthenticated, remote attacker can exploit this vulnerability to crash the Simple Network Management Protocol (SNMP) service.
Yes, Cisco has released patches to address this vulnerability. Please refer to the Cisco Security Advisory for more information.