First published: Wed Aug 05 2020(Updated: )
A vulnerability in the CLI of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to excessive verbosity in certain log subscriptions. An attacker could exploit this vulnerability by accessing specific log files on an affected device. A successful exploit could allow the attacker to obtain sensitive log data, which may include user credentials. To exploit this vulnerability, the attacker would need to have valid credentials at the operator level or higher on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-log-YxQ6g2kG
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | ||
Cisco Content Security Management Virtual Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-esa-sma-log-YxQ6g2kG is classified as high due to the potential for sensitive information disclosure.
To fix cisco-sa-esa-sma-log-YxQ6g2kG, upgrade to the latest available firmware version for Cisco Email Security Appliance or Cisco Content Security Management Appliance.
Cisco Email Security Appliance and Cisco Content Security Management Appliance users are affected by cisco-sa-esa-sma-log-YxQ6g2kG.
cisco-sa-esa-sma-log-YxQ6g2kG enables authenticated remote attackers to access sensitive information on affected devices.
cisco-sa-esa-sma-log-YxQ6g2kG was disclosed in a security advisory by Cisco.