First published: Wed Feb 05 2025(Updated: )
Multiple vulnerabilities in Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an attacker to execute arbitrary commands locally or remotely. For more information about these vulnerabilities, see the Details section of this advisory.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS software | ||
Cisco Secure Email and Web Manager Firmware | ||
Cisco AsyncOS for Secure Email Gateway | ||
Cisco Secure Web Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-esa-sma-wsa-multi-yKUJhS34 is classified as high due to potential command execution vulnerabilities.
To fix cisco-sa-esa-sma-wsa-multi-yKUJhS34, users should apply the latest software updates provided by Cisco for the affected products.
Cisco AsyncOS Software, Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance are all affected by cisco-sa-esa-sma-wsa-multi-yKUJhS34.
The risks associated with cisco-sa-esa-sma-wsa-multi-yKUJhS34 include the possibility of unauthorized remote command execution, which can lead to data breaches or system compromise.
As of now, Cisco recommends applying available patches as the primary response to cisco-sa-esa-sma-wsa-multi-yKUJhS34, with no specific workarounds offered.