CWE
201
Advisory Published

cisco-sa-esa-wsa-sma-info-RHp44vAC: Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability

First published: Wed Jan 20 2021(Updated: )

A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC

Affected SoftwareAffected VersionHow to fix
Cisco Email Security Appliance Firmware
Cisco Content Security Management Virtual Appliance
Cisco Web Security Appliance

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-esa-wsa-sma-info-RHp44vAC?

    The severity of cisco-sa-esa-wsa-sma-info-RHp44vAC is considered high due to its potential for unauthorized remote access.

  • How do I fix cisco-sa-esa-wsa-sma-info-RHp44vAC?

    To fix cisco-sa-esa-wsa-sma-info-RHp44vAC, apply the recommended patches and updates provided by Cisco for the affected appliances.

  • Which devices are affected by cisco-sa-esa-wsa-sma-info-RHp44vAC?

    The affected devices include Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA).

  • What type of attack does cisco-sa-esa-wsa-sma-info-RHp44vAC enable?

    cisco-sa-esa-wsa-sma-info-RHp44vAC enables unauthenticated remote attackers to access general system information.

  • Is cisco-sa-esa-wsa-sma-info-RHp44vAC easy to exploit?

    Yes, cisco-sa-esa-wsa-sma-info-RHp44vAC can be exploited easily due to its reliance on an unprotected authentication mechanism.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203