First published: Wed Jan 20 2021(Updated: )
A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | ||
Cisco Content Security Management Virtual Appliance | ||
Cisco Web Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-esa-wsa-sma-info-RHp44vAC is considered high due to its potential for unauthorized remote access.
To fix cisco-sa-esa-wsa-sma-info-RHp44vAC, apply the recommended patches and updates provided by Cisco for the affected appliances.
The affected devices include Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA).
cisco-sa-esa-wsa-sma-info-RHp44vAC enables unauthenticated remote attackers to access general system information.
Yes, cisco-sa-esa-wsa-sma-info-RHp44vAC can be exploited easily due to its reliance on an unprotected authentication mechanism.