First published: Wed Jan 10 2024(Updated: )
Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance | ||
All of | ||
Cisco AsyncOS for Secure Email Gateway | ||
Cisco AsyncOS for Secure Email Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31488 has been assessed with high severity due to its potential to allow attackers to execute arbitrary code.
To fix CVE-2023-31488, upgrade to the latest version of Hyland Perceptive Filters or the affected Cisco products as outlined in the vendor notice.
CVE-2023-31488 affects Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and other non-Cisco products that utilize Hyland Perceptive Filters before version 2023-12-08.
CVE-2023-31488 enables remote attackers to trigger a segmentation fault and potentially execute arbitrary code via specially crafted documents.
CVE-2023-31488 was disclosed in late 2023, with implications for software versions released before December 8, 2023.