First published: Wed Jan 22 2020(Updated: )
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-bypass-5Cdv2HMA
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-esa-bypass-5Cdv2HMA is considered high due to the potential for attackers to bypass email filters.
To fix cisco-sa-esa-bypass-5Cdv2HMA, you should update to the latest version of Cisco AsyncOS Software for the Email Security Appliance.
cisco-sa-esa-bypass-5Cdv2HMA affects Cisco Email Security Appliance running impacted versions of Cisco AsyncOS Software.
An unauthenticated remote attacker can exploit cisco-sa-esa-bypass-5Cdv2HMA by sending specially crafted emails.
The nature of the vulnerability in cisco-sa-esa-bypass-5Cdv2HMA is improper validation of incoming emails allowing filter bypass.