First published: Wed Jan 18 2023(Updated: )
On January 18, 2023, Cisco disclosed the following:A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | ||
Cisco AsyncOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability cisco-sa-esa-url-bypass-WbMQqNJh is classified as high, as it allows attackers to bypass URL reputation filters.
To fix the vulnerability cisco-sa-esa-url-bypass-WbMQqNJh, users should upgrade to the latest version of Cisco AsyncOS Software for the Email Security Appliance.
The vulnerability cisco-sa-esa-url-bypass-WbMQqNJh affects users of Cisco Email Security Appliance running vulnerable versions of Cisco AsyncOS Software.
The potential impacts of cisco-sa-esa-url-bypass-WbMQqNJh include unauthorized access to malicious URLs, leading to phishing and malware incidents.
Currently, no official workarounds are provided for the cisco-sa-esa-url-bypass-WbMQqNJh vulnerability other than applying the security update.