First published: Wed Jul 15 2020(Updated: )
A vulnerability in URL filtering for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass URL filtering on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted, malicious HTTP request to an affected device. A successful exploit could allow the attacker to redirect users to malicious sites. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-filt-39jXvMfM
Credit: This vulnerability was found by Dennis McCabe Jr. Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ESA-filt-39jXvMfM is considered high due to its potential to allow an unauthenticated attacker to bypass URL filtering.
To fix cisco-sa-ESA-filt-39jXvMfM, ensure that you update your Cisco Email Security Appliance to the latest firmware version provided by Cisco.
The cisco-sa-ESA-filt-39jXvMfM vulnerability is caused by insufficient input validation in the URL filtering feature of the Cisco Email Security Appliance.
Yes, an attacker can exploit the cisco-sa-ESA-filt-39jXvMfM vulnerability remotely without authentication.
The cisco-sa-ESA-filt-39jXvMfM vulnerability affects all versions of the Cisco Email Security Appliance that utilize URL filtering.