First published: Wed Feb 05 2025(Updated: )
A vulnerability in Simple Network Management Protocol (SNMP) polling for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to obtain confidential information about the underlying operating system.This vulnerability exists because the appliances do not protect confidential information at rest in response to SNMP poll requests. An attacker could exploit this vulnerability by sending a crafted SNMP poll request to the affected appliance. A successful exploit could allow the attacker to discover confidential information that should be restricted. To exploit this vulnerability, an attacker must have the configured SNMP credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Email and Web Manager Firmware | ||
Cisco AsyncOS for Secure Email Gateway | ||
Cisco Secure Web Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX is rated as high due to the potential exposure of confidential information.
To mitigate cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX, update to the latest firmware version provided by Cisco for the affected products.
The affected products are Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance.
Yes, cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX can be exploited remotely by an authenticated attacker.
cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX can expose confidential information about the underlying operating system.