Vulnerabilites related to cisco - asyncos
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-07 17:10
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*", "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*", "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*", "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*", "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.0.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "3A641361-8EE6-445E-9EB4-391E69BB744B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.0-115:*:*:*:*:*:*:*", "matchCriteriaId": "866979C3-4EFE-4590-AD48-D181C5A5E05E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.1-161:*:*:*:*:*:*:*", "matchCriteriaId": "49A0FCF6-12DB-4054-BBDB-96AA0892C3ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.5.1-105:*:*:*:*:*:*:*", "matchCriteriaId": "DF576F13-9097-4F7D-A0C8-57DEC3A68429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-452:*:*:*:*:*:*:*", "matchCriteriaId": "6271A5F1-9BC0-4106-9D5E-C32B4190FCB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "09531E94-0350-45E5-85B1-BA185074120F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-636:*:*:*:*:*:*:*", "matchCriteriaId": "C809B0DD-78F7-4282-AA6C-7D1203616BDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-658:*:*:*:*:*:*:*", "matchCriteriaId": "CDF649DC-97E4-4C9E-BFE9-D35501229AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-670:*:*:*:*:*:*:*", "matchCriteriaId": "34E0C6D6-37B2-4781-837A-4C2C1656FF20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-678:*:*:*:*:*:*:*", "matchCriteriaId": "CBDAAADB-25F1-4498-A0C9-0CBB4D19ECC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*", "matchCriteriaId": "80439833-447F-4582-B1FA-278306ABFE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*", "matchCriteriaId": "29CB6A5B-34EE-4958-ACB5-6433E8C0014D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*", "matchCriteriaId": "C18D9472-A7E4-4083-9369-DBA97A40022B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*", "matchCriteriaId": "8A1365DA-3163-4CFF-9F48-1998C9F6A29B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*", "matchCriteriaId": "2C5B0C94-A72F-4B5A-A9F8-00EF60D6C001", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*", "matchCriteriaId": "74C14467-2836-4FDF-8B4B-670D08511614", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*", "matchCriteriaId": "E50DAB07-5582-47C8-A0B0-7C0DA63DC70A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*", "matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*", "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*", "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*", "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*", "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*", "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\rThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email and Web Manager y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20256", "lastModified": "2025-08-07T17:10:32.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-05-15T18:15:08.720", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-03 22:15
Modified
2024-11-21 07:40
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.
This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.7.0-406 | |
cisco | asyncos | 11.7.0-418 | |
cisco | asyncos | 11.7.1-006 | |
cisco | asyncos | 11.7.1-020 | |
cisco | asyncos | 11.7.1-049 | |
cisco | asyncos | 11.7.2-011 | |
cisco | asyncos | 11.8.0-414 | |
cisco | asyncos | 11.8.1-023 | |
cisco | asyncos | 11.8.3-018 | |
cisco | asyncos | 11.8.3-021 | |
cisco | asyncos | 12.0.1-268 | |
cisco | asyncos | 12.0.3-007 | |
cisco | asyncos | 12.5.1-011 | |
cisco | asyncos | 12.5.2-007 | |
cisco | asyncos | 12.5.4-005 | |
cisco | asyncos | 12.5.5-004 | |
cisco | asyncos | 14.0.2-012 | |
cisco | asyncos | 14.0.3-014 | |
cisco | asyncos | 14.0.4-005 | |
cisco | asyncos | 14.5.0-498 | |
cisco | asyncos | 14.5.1-008 | |
cisco | asyncos | 14.5.1-016 | |
cisco | s195 | - | |
cisco | s395 | - | |
cisco | s695 | - | |
cisco | web_security_appliance_s170 | - | |
cisco | web_security_appliance_s190 | - | |
cisco | web_security_appliance_s380 | - | |
cisco | web_security_appliance_s390 | - | |
cisco | web_security_appliance_s680 | - | |
cisco | web_security_appliance_s690 | - | |
cisco | web_security_appliance_s690x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*", "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*", "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*", "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*", "matchCriteriaId": "E401F29A-026F-4097-B513-47911CB3AA09", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3B097B-F689-4886-A0C6-B71ECAD783CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C3AECC-9270-42B5-A36E-208AA0B48D93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5290B9CF-CF7D-4762-B5EE-5DAEA03C6409", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE85462C-079B-4488-AB0E-989D41EB7AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A8E5E8-8361-4BC8-BFA9-CAE4745A9C48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBEAFE16-BD4F-4538-9A06-173FB678DB8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "id": "CVE-2023-20215", "lastModified": "2024-11-21T07:40:54.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-03T22:15:11.513", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-202" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-26 03:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 11.5.1-fcs-125 | |
cisco | web_security_appliance | 11.7.0-fcs-418 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "79ADCDD2-51B2-444C-9D78-8EEC31D460BD", "versionEndExcluding": "10.1.5-004", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CA643A1-3290-48E9-A447-65C522D5C8A8", "versionEndExcluding": "11.5.3-016", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0FD156D-EB17-4594-89F2-57DE438B3F91", "versionEndExcluding": "11.7.1-006", "versionStartIncluding": "11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "matchCriteriaId": "4608EA78-F5CD-42A3-9F25-124ED4A7F792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-418:*:*:*:*:*:*:*", "matchCriteriaId": "67723D99-6D51-452C-9512-3474721EF5F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web del Software Cisco AsyncOS para Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado realizar un reinicio no autorizado del sistema en un dispositivo afectado. La vulnerabilidad es debido a controles de autorizaci\u00f3n inapropiados para una URL espec\u00edfica en la interfaz de administraci\u00f3n web. Un atacante podr\u00eda explotar esta vulnerabilidad al enviar una petici\u00f3n HTTP dise\u00f1ada en un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda tener un doble impacto: el atacante podr\u00eda cambiar la contrase\u00f1a del administrador, conseguir acceso privilegiado o restablecer los detalles de configuraci\u00f3n de red, causando una condici\u00f3n de denegaci\u00f3n de servicio (DoS). En ambos escenarios, una intervenci\u00f3n manual es requerida para restaurar las operaciones normales." } ], "id": "CVE-2019-15956", "lastModified": "2024-11-21T04:29:49.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-26T03:15:11.440", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-17 17:15
Modified
2025-08-08 01:56
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 11.1.0-131 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios del sistema en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en ciertas partes de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de operador v\u00e1lidas." } ], "id": "CVE-2024-20429", "lastModified": "2025-08-08T01:56:39.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-17T17:15:14.497", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-30 09:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/102002 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039917 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102002 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039917 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." }, { "lang": "es", "value": "Una vulnerabilidad en el esc\u00e1ner Multipurpose Internet Mail Extensions (MIME) de Cisco AsyncOS Software para Cisco Email Security Appliances (ESA) podr\u00eda permitir que un atacante remoto no autenticado omita los filtros de usuario configurados en el dispositivo. La vulnerabilidad se debe a la gesti\u00f3n incorrecta de errores de una cabecera MIME en un archivo adjunto de correo electr\u00f3nico. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un correo electr\u00f3nico con un archivo adjunto MIME manipulado. Por ejemplo, un exploit exitoso podr\u00eda permitir que el atacante omita los filtros de usuario configurados para enviar el correo electr\u00f3nico. Las cabeceras MIME podr\u00edan no ser compatibles con RFC. Sin embargo, algunos clientes de correo electr\u00f3nico podr\u00edan seguir permitiendo que los usuarios accedan al archivo adjunto, que tal vez no haya sido correctamente filtrado por el dispositivo. Cisco Bug IDs: CSCvf44666." } ], "id": "CVE-2017-12353", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-30T09:29:01.073", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102002" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039917" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-04 18:15
Modified
2024-11-21 06:43
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.
This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9625B97C-0AAE-4663-96A0-15B3630F822B", "versionEndExcluding": "14.2.1-015", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA0D435-B4A2-4445-AF55-D698F459AF98", "versionEndExcluding": "14.3.0-023", "versionStartIncluding": "14.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "0609158E-0B18-44F9-8B9F-F52C516AA2E3", "versionEndExcluding": "14.2.0-217", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "863E9EA1-BDE7-448C-AE8E-7C76BEB67342", "versionEndExcluding": "14.3.0-115", "versionStartIncluding": "14.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "458945C0-C70B-4D25-BE9E-5293B9395125", "versionEndExcluding": "12.0.5-011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CB4F18A-3EE6-4765-B708-0A146973E75A", "versionEndExcluding": "12.5.4-005", "versionStartIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "15AC78C0-B461-45F3-BB08-EC93F91B31DC", "versionEndExcluding": "14.0.2-012", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "67074526-9933-46B3-9FE3-A0BE73C5E8A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.\r\n\r This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager y Cisco Secure Web Appliance, anteriormente conocido como Cisco Web Security Appliance (WSA), podr\u00eda permitir que un atacante remoto autenticado acceda a informaci\u00f3n sensible de un dispositivo afectado, incluidas las credenciales de usuario. Esta vulnerabilidad se debe a una aplicaci\u00f3n d\u00e9bil de las comprobaciones de autorizaci\u00f3n del back-end. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener datos confidenciales almacenados en el dispositivo afectado." } ], "id": "CVE-2022-20942", "lastModified": "2024-11-21T06:43:52.233", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:11.100", "references": [ { "source": "psirt@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-359" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 07:15
Modified
2024-11-21 07:40
Severity ?
0.0 (None) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.
This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c160:-:*:*:*:*:*:*:*", "matchCriteriaId": "50009089-506D-42B4-B34D-CFC719B0395B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8ED62C8-2B7E-47CA-BE16-00E02CA72763", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370d:-:*:*:*:*:*:*:*", "matchCriteriaId": "93AF10FC-7988-446F-86E6-8A4E90762DA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c670:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1149EA5-37D0-4E1F-803D-A7A0658653FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_x1070:-:*:*:*:*:*:*:*", "matchCriteriaId": "E312DF25-A961-4682-B374-4A394431F8E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.\r\n\r This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en el mecanismo de filtrado de URL del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir que un atacante remoto no autenticado evite los filtros de reputaci\u00f3n de URL en un dispositivo afectado. Esta vulnerabilidad se debe a un procesamiento inadecuado de las URL. Un atacante podr\u00eda aprovechar esta vulnerabilidad creando una URL de una manera particular. Un exploit exitoso podr\u00eda permitir al atacante eludir los filtros de reputaci\u00f3n de URL configurados para un dispositivo afectado, lo que podr\u00eda permitir que URL maliciosas pasen a trav\u00e9s del dispositivo." } ], "id": "CVE-2023-20057", "lastModified": "2024-11-21T07:40:27.190", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 0.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-20T07:15:17.377", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-792" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-08 07:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103407 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040464 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103407 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040464 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:10.5.1-296:*:*:*:*:*:*:*", "matchCriteriaId": "1FBE634F-F3AA-4DDD-A177-CA808777432C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." }, { "lang": "es", "value": "Una vulnerabilidad en el servidor FTP de Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto no autenticado inicie sesi\u00f3n en el servidor FTP del dispositivo sin una contrase\u00f1a v\u00e1lida. El atacante necesita tener un nombre de usuario v\u00e1lido. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de las credenciales de usuario FTP. Un atacante podr\u00eda explotar esta vulnerabilidad utilizando FTP para conectarse a la direcci\u00f3n IP de administraci\u00f3n del dispositivo objetivo. Su explotaci\u00f3n podr\u00eda permitir que el atacante inicie sesi\u00f3n en el servidor FTP de Cisco WSA sin tener una contrase\u00f1a v\u00e1lida. La vulnerabilidad afecta a Cisco AsyncOS para software de WSA, tanto en m\u00e1quinas virtuales como f\u00edsicas que ejecuten cualquier distribuci\u00f3n de AsyncOS 10.5.1 para el software de WSA. El dispositivo es vulnerable solo si est\u00e1 FTP habilitado en la interfaz de administraci\u00f3n. FTP est\u00e1 deshabilitado por defecto. Cisco Bug IDs: CSCvf74281." } ], "id": "CVE-2018-0087", "lastModified": "2024-11-21T03:37:29.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-08T07:29:00.223", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103407" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040464" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-07 04:59
Modified
2025-04-12 10:46
Severity ?
Summary
The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1ED121A-E76C-4256-A2BB-B44E9FC85B9B", "versionEndIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." }, { "lang": "es", "value": "El motor de inspecci\u00f3n uuencode en Cisco AsyncOS en los dispositivos Cisco Email Security Appliance (ESA) 8.5 y anteriores permite a atacantes remotos evadir las restricciones de contenido a trav\u00e9s de un adjunto de email manipulado con cifrado uuencode, tambi\u00e9n conocido como Bug ID CSCzv54343." } ], "id": "CVE-2015-0605", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-07T04:59:09.000", "references": [ { "source": "psirt@cisco.com", "url": "http://secunia.com/advisories/62829" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/72528" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | email_security_appliance | 11.1.0-131 | |
cisco | asyncos | 12.1.0-085 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "F1928AAB-6EEC-44A0-86F5-7D96F761B768", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-085:*:*:*:*:*:*:*", "matchCriteriaId": "AAE5D24B-BB6A-40F6-92F0-977982C4E3DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado causar que la utilizaci\u00f3n de la CPU aumente al 100 por ciento, causando una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido al manejo inapropiado de los mensajes de correo electr\u00f3nico que contienen archivos adjuntos de gran tama\u00f1o.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje de correo electr\u00f3nico malicioso por medio del dispositivo apuntado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una condici\u00f3n de DoS permanente debido a la alta utilizaci\u00f3n de la CPU.\u0026#xa0;Esta vulnerabilidad puede requerir una intervenci\u00f3n manual para recuperar el ESA" } ], "id": "CVE-2019-1947", "lastModified": "2024-11-21T04:37:44.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:14.520", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-04 03:15
Modified
2024-11-21 05:31
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | content_security_management_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "94855F23-1DA0-4A08-BBE5-167A265A4155", "versionEndIncluding": "13.5.1-277", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9010DBBA-9AE9-4510-A63B-1C1843A98C23", "versionEndIncluding": "13.6.1-193", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "60635EC8-9AFA-400D-A919-66E60CDEF852", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD91D872-A21C-4A08-8A05-D0D9B0372570", "versionEndIncluding": "11.7.2-011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web en el software Cisco AsyncOS para Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA) y Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado acceder a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad se presenta porque un m\u00e9todo no seguro es usado para enmascarar determinadas contrase\u00f1as en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda explotar esta vulnerabilidad al observar el c\u00f3digo HTML sin procesar que es recibido desde la interfaz. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as configuradas en toda la interfaz" } ], "id": "CVE-2020-3547", "lastModified": "2024-11-21T05:31:17.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-04T03:15:11.200", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-08 13:15
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDD9108-5581-49E9-8182-528CF111F682", "versionEndExcluding": "15.5.1-024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la CLI de Cisco Crosswork NSO y la CLI de ConfD podr\u00eda permitir que un atacante local autenticado y con pocos privilegios eleve los privilegios a root en el sistema operativo subyacente. La vulnerabilidad se debe a una asignaci\u00f3n de privilegios incorrecta cuando se utilizan comandos CLI espec\u00edficos. Un atacante podr\u00eda aprovechar esta vulnerabilidad ejecutando un comando CLI afectado. Un exploit exitoso podr\u00eda permitir al atacante elevar los privilegios a root en el sistema operativo subyacente." } ], "id": "CVE-2024-20383", "lastModified": "2025-08-08T13:15:28.507", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T18:15:09.910", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-06 13:15
Modified
2024-11-21 05:44
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | content_security_management_appliance | - | |
cisco | email_security_appliance | - | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | ironport_web_security_appliance | 13.6.2-023 | |
cisco | ironport_web_security_appliance | 14.0.0-090 | |
cisco | ironport_web_security_appliance | 14.0.0-133 | |
cisco | ironport_web_security_appliance | 14.0.0-292 | |
cisco | ironport_web_security_appliance | 14.0.0-300 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F22A698-F34C-44C0-9911-0840A2E7E163", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "71D9CB16-8225-4935-91A9-C0EA9A4305BD", "versionEndExcluding": "14.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:13.6.2-023:*:*:*:*:*:*:*", "matchCriteriaId": "9FC801CD-44BA-4026-9FA4-A40A9D821E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-090:*:*:*:*:*:*:*", "matchCriteriaId": "BD0CF884-1313-446F-BFDA-A690C5F6D495", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-133:*:*:*:*:*:*:*", "matchCriteriaId": "D06C6D3F-483C-4735-B488-1A11DC372B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-292:*:*:*:*:*:*:*", "matchCriteriaId": "A7FF3FE1-6DE5-4CD5-A864-1E136D059926", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-300:*:*:*:*:*:*:*", "matchCriteriaId": "E601B03B-DF17-4F0B-A2DA-415FDC581931", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), y Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado acceder a informaci\u00f3n confidencial. en un dispositivo afectado.\u0026#xa0;La vulnerabilidad se presenta porque la informaci\u00f3n confidencial es inclu\u00edda en las peticiones HTTP que son intercambiadas entre el usuario y el dispositivo.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al observar las peticiones HTTP sin procesar que son enviadas a la interfaz.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as que est\u00e1n configuradas en toda la interfaz" } ], "id": "CVE-2021-1516", "lastModified": "2024-11-21T05:44:31.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-06T13:15:10.953", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-540" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-04 16:15
Modified
2024-11-21 06:11
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "415C4EC7-44E1-4C07-85F0-665A186237EC", "versionEndExcluding": "13.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.3-010:*:*:*:*:*:*:*", "matchCriteriaId": "E2CCDF88-877D-4CB0-B7BD-24D317FA6F16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.7.0-093:*:*:*:*:*:*:*", "matchCriteriaId": "3E94354C-6D93-4136-A4B6-5F926E02CA12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BD3B1B3-3AFD-4B4A-9FCC-F2EEFA497032", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56CF47B-72C9-4590-89B0-59D43CA65894", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "81DBE5E7-524E-458C-BA56-AA806A55ACAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFD07C1-F2A7-4DCE-8269-C8B3D2DE1C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "9107B3CD-A607-4C11-ACAC-ACE66DDA51F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDB92-73A0-4FF1-976E-0CD9D342A712", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA39FE7-9CDA-41D3-B31D-33F9DB2FB0B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E68E58E5-00AB-41BB-85C0-6D65359A4DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en el algoritmo de an\u00e1lisis del correo electr\u00f3nico del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado llevar a cabo un ataque de denegaci\u00f3n de servicio (DoS) contra un dispositivo afectado. Esta vulnerabilidad es debido a que la comprobaci\u00f3n de entrada de los correos electr\u00f3nicos entrantes es insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un correo electr\u00f3nico dise\u00f1ado mediante Cisco ESA. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante agotar todos los recursos de CPU disponibles en un dispositivo afectado durante un per\u00edodo prolongado de tiempo, impidiendo que otros correos electr\u00f3nicos sean procesados y dando lugar a una condici\u00f3n de DoS" } ], "id": "CVE-2021-34741", "lastModified": "2024-11-21T06:11:05.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-04T16:15:08.660", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-04 18:15
Modified
2024-11-21 06:43
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability.
This vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A74DE82-C879-48E3-8E74-F03D18B8ECF4", "versionEndExcluding": "14.2.1", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACCC821-A995-43A9-9BA2-8A335A55FC99", "versionEndExcluding": "14.2.0", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AEA203-411D-40C8-AA2A-A0FB4D2789DB", "versionEndExcluding": "12.5.5", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE2447D4-9F35-4D76-BF77-F4E63DB57DA1", "versionEndExcluding": "14.0.4", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5:*:*:*:*:*:*:*", "matchCriteriaId": "2FFF4B58-3DAF-47D7-8569-5D3D27F14D22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "67074526-9933-46B3-9FE3-A0BE73C5E8A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability. \r\n\r\nThis vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.\r\n" }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance, Cisco Secure Email and Web Manager y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado eleve los privilegios en un sistema afectado. El atacante necesita credenciales v\u00e1lidas para aprovechar esta vulnerabilidad. Esta vulnerabilidad se debe al uso de un valor codificado a mano para cifrar un token utilizado para ciertas llamadas API. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando una solicitud HTTP manipulada. Un exploit exitoso podr\u00eda permitir al atacante hacerse pasar por otro usuario v\u00e1lido y ejecutar comandos con los privilegios de esa cuenta de usuario." } ], "id": "CVE-2022-20868", "lastModified": "2024-11-21T06:43:43.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:10.983", "references": [ { "source": "psirt@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-07-31 19:44
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "98BB5CCD-FDE7-4893-B504-71742B9B69A7", "versionEndExcluding": "15.0.2-034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A27C67F0-EB2E-4473-808F-D93867B3C7B6", "versionEndExcluding": "15.5.1-055", "versionStartIncluding": "15.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "547E3547-7946-4CDA-B83C-397BA2A64851", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AEC20C6-EBD6-4DC1-AFED-42C165ED3F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B927280-353B-49B2-A87E-45D6602C423D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B017D7F9-2297-4235-8DB8-0A29E1202254", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDD9108-5581-49E9-8182-528CF111F682", "versionEndExcluding": "15.5.1-024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email and Web Manager y Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20258", "lastModified": "2025-07-31T19:44:11.867", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-05-15T18:15:09.193", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-04 18:15
Modified
2024-11-21 06:43
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account.
This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | secure_email_gateway | - | |
cisco | asyncos | * | |
cisco | secure_email_and_web_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A74DE82-C879-48E3-8E74-F03D18B8ECF4", "versionEndExcluding": "14.2.1", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACCC821-A995-43A9-9BA2-8A335A55FC99", "versionEndExcluding": "14.2.0", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account. \r\n\r This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.\r\n" }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance y Cisco Secure Email and Web Manager podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n SQL como root en un sistema afectado. El atacante debe tener las credenciales de una cuenta de usuario con altos privilegios. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de los par\u00e1metros enviados por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en la aplicaci\u00f3n y enviando solicitudes maliciosas a un sistema afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener datos o modificar datos almacenados en la base de datos subyacente del sistema afectado." } ], "id": "CVE-2022-20867", "lastModified": "2024-11-21T06:43:43.000", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:10.923", "references": [ { "source": "psirt@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-06 17:15
Modified
2025-08-07 19:08
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*", "matchCriteriaId": "E5DBB5E2-734A-4BDC-B5D5-D6658A278F4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*", "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*", "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*", "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*", "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*", "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*", "matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*", "matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*", "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*", "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*", "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*", "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*", "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Secure Email Gateway y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20504", "lastModified": "2025-08-07T19:08:29.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-11-06T17:15:16.053", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-16 07:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101932 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039828 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101932 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039828 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:10.1.1-234:*:*:*:*:*:*:*", "matchCriteriaId": "13CDDB37-3A0A-4F80-8356-32DDB95050A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:10.1.1-235:*:*:*:*:*:*:*", "matchCriteriaId": "FC59E598-B7FE-4C19-B840-7E40C75A8F89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." }, { "lang": "es", "value": "Una vulnerabilidad en la caracter\u00edstica de filtrado de archivos Advanced Malware Protection (AMP) de Cisco AsyncOS Software para Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto sin autenticar omita una regla de filtrado de archivos AMP configurada. Los tipos de archivo que se han visto afectados son los comprimidos o zip. La vulnerabilidad se debe a los valores hash de archivo incorrectos y diferentes cuando AMP escanea el archivo. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un archivo adjunto de correo electr\u00f3nico manipulado al dispositivo objetivo. Un exploit podr\u00eda permitir que el atacante omita un filtro de archivos AMP configurado. Cisco Bug IDs: CSCvf52943." } ], "id": "CVE-2017-12303", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-16T07:29:00.430", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101932" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039828" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-06 19:15
Modified
2024-11-21 06:43
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7693CE1B-D30F-4491-988F-8D420606CCEE", "versionEndExcluding": "14.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. La vulnerabilidad es debido a que la interfaz de administraci\u00f3n basada en web no comprueba correctamente las entradas proporcionadas por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad insertando datos maliciosos en un campo de datos espec\u00edfico de la interfaz afectada. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada" } ], "id": "CVE-2022-20781", "lastModified": "2024-11-21T06:43:32.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.430", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-20 11:13
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1030258 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030258 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | - | |
cisco | content_security_management_appliance | - | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "60635EC8-9AFA-400D-A919-66E60CDEF852", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." }, { "lang": "es", "value": "Cisco AsyncOS en dispositivos Email Security Appliance (ESA) y Content Security Management Appliance (SMA), cuando Active Directory est\u00e1 habilitado, no maneja debidamente nombres de grupos, lo que permite a atacantes remotos ganar privilegios de rol mediante el aprovechamiento de similaridades entre nombres de grupos, tambi\u00e9n conocido como Bug ID CSCum86085." } ], "id": "CVE-2014-2195", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-20T11:13:37.593", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1030258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1030258" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 19:15
Modified
2025-07-31 19:44
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "BADF6D45-FDBE-42A7-A915-0DDD8FBC64F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto no autenticado obtenga informaci\u00f3n confidencial de la red." } ], "id": "CVE-2020-3122", "lastModified": "2025-07-31T19:44:34.333", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2025-03-04T19:15:36.890", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-08 17:11
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*", "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.3-022:*:*:*:*:*:*:*", "matchCriteriaId": "D72D8A34-34BF-4390-B244-23AEAC08ACD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*", "matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*", "matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*", "matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*", "matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*", "matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*", "matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*", "matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*", "matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*", "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*", "matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*", "matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*", "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*", "matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*", "matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*", "matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*", "matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*", "matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*", "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*", "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*", "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-004:*:*:*:*:*:*:*", "matchCriteriaId": "8E7D1E25-9E12-451F-A454-78560153CF86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*", "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*", "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "F5784365-ACFB-4391-99C2-8B5B525039B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n de comandos contra un dispositivo afectado. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los archivos de configuraci\u00f3n XML por parte de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo de configuraci\u00f3n XML manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante inyectar comandos al sistema operativo subyacente con privilegios de superusuario." } ], "id": "CVE-2025-20184", "lastModified": "2025-08-08T17:11:23.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.697", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-06 20:15
Modified
2024-11-21 05:44
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F97C8DE-48FA-4609-BF07-8E6AD4C34322", "versionEndExcluding": "14.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL en un dispositivo afectado. Esta vulnerabilidad es debido al procesamiento inapropiado de las URL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una URL de una manera particular. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL que est\u00e1n configurados para un dispositivo afectado, lo que podr\u00eda permitir el paso de URLs maliciosas mediante el dispositivo" } ], "id": "CVE-2021-1534", "lastModified": "2024-11-21T05:44:34.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T20:15:07.657", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-06 16:56
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 11.1.0-131 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | asyncos | 14.3.0-032 | |
cisco | asyncos | 15.0.0-104 | |
cisco | asyncos | 15.0.1-030 | |
cisco | asyncos | 15.5.0-048 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "4E5FBEA5-29B5-4F8D-8A0D-DE329094816B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20257", "lastModified": "2025-08-06T16:56:50.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-05-15T18:15:08.967", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-15 16:15
Modified
2025-08-11 17:44
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 12.5.1-011 | |
cisco | asyncos | 12.5.2-007 | |
cisco | asyncos | 12.5.2-011 | |
cisco | asyncos | 12.5.3-002 | |
cisco | asyncos | 12.5.4-005 | |
cisco | asyncos | 12.5.4-011 | |
cisco | asyncos | 14.0.2-012 | |
cisco | asyncos | 14.1.0-032 | |
cisco | asyncos | 14.1.0-041 | |
cisco | asyncos | 14.1.0-047 | |
cisco | asyncos | 14.5.0-498 | |
cisco | secure_web_appliance_virtual_s1000v | - | |
cisco | secure_web_appliance_virtual_s100v | - | |
cisco | secure_web_appliance_virtual_s300v | - | |
cisco | secure_web_appliance_virtual_s600v | - | |
cisco | secure_web_appliance_s196 | - | |
cisco | secure_web_appliance_s396 | - | |
cisco | secure_web_appliance_s696 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*", "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de Cisco\u0026#xa0;AsyncOS para Cisco\u0026#xa0;Secure Web Appliance, anteriormente Cisco\u0026#xa0;Web Security Appliance (WSA),\u0026#xa0;podr\u00eda permitir que un atacante remoto autenticado realice una inyecci\u00f3n de comandos y eleve los privilegios a superusuario. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la interfaz web. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el sistema y enviando un paquete HTTP dise\u00f1ado al dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a superusuario. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de solo lectura. Cisco\u0026#xa0;ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad. Atenci\u00f3n: la simplificaci\u00f3n de la cartera de Cisco incluye el cambio de nombre de los productos de seguridad bajo una sola marca: Cisco\u0026#xa0;Secure. Para obtener m\u00e1s informaci\u00f3n, consulte." } ], "id": "CVE-2022-20871", "lastModified": "2025-08-11T17:44:07.837", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-15T16:15:23.757", "references": [ { "source": "psirt@cisco.com", "tags": [ "Not Applicable" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU" }, { "source": "psirt@cisco.com", "tags": [ "Not Applicable" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-17 17:15
Modified
2025-08-08 01:55
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.7.0-406 | |
cisco | asyncos | 11.7.0-418 | |
cisco | asyncos | 11.7.1-006 | |
cisco | asyncos | 11.7.1-020 | |
cisco | asyncos | 11.7.1-049 | |
cisco | asyncos | 11.7.2-011 | |
cisco | asyncos | 11.8.0-414 | |
cisco | asyncos | 11.8.1-023 | |
cisco | asyncos | 11.8.3-018 | |
cisco | asyncos | 11.8.3-021 | |
cisco | asyncos | 12.0.1-268 | |
cisco | asyncos | 12.0.3-007 | |
cisco | asyncos | 12.5.1-011 | |
cisco | asyncos | 12.5.2-007 | |
cisco | asyncos | 12.5.4-005 | |
cisco | asyncos | 12.5.5-004 | |
cisco | asyncos | 12.5.6-008 | |
cisco | asyncos | 14.0.2-012 | |
cisco | asyncos | 14.0.3-014 | |
cisco | asyncos | 14.0.4-005 | |
cisco | asyncos | 14.0.5-007 | |
cisco | asyncos | 14.5.0-498 | |
cisco | asyncos | 14.5.1-016 | |
cisco | asyncos | 14.5.2-011 | |
cisco | asyncos | 15.0.0-322 | |
cisco | asyncos | 15.0.0-355 | |
cisco | asyncos | 15.1.0-287 | |
cisco | secure_web_appliance_virtual_s1000v | - | |
cisco | secure_web_appliance_virtual_s100v | - | |
cisco | secure_web_appliance_virtual_s300v | - | |
cisco | secure_web_appliance_virtual_s600v | - | |
cisco | secure_web_appliance_s196 | - | |
cisco | secure_web_appliance_s396 | - | |
cisco | secure_web_appliance_s696 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*", "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*", "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*", "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*", "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials." }, { "lang": "es", "value": "Una vulnerabilidad en la CLI de Cisco AsyncOS para Secure Web Appliance podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios y eleve privilegios a root. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para la CLI. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en el sistema y ejecutando un comando manipulado en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Para explotar con \u00e9xito esta vulnerabilidad, un atacante necesitar\u00eda al menos credenciales de invitado." } ], "id": "CVE-2024-20435", "lastModified": "2025-08-08T01:55:41.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-17T17:15:14.787", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-04 20:15
Modified
2024-11-21 04:37
Severity ?
7.7 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.1.4-017 | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 11.5.1-fcs-125 | |
cisco | web_security_appliance | 11.7.0-256 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B833081-5EA8-42BB-9CD0-D278AFE3FFDA", "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72CE539-D7A7-41D9-9B0E-727435449E80", "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD71C35-D0E3-403C-BE0D-63A8E3277BEA", "versionEndExcluding": "11.7.0-407", "versionStartIncluding": "11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.1.4-017:*:*:*:*:*:*:*", "matchCriteriaId": "4C1C1F79-CEFE-4361-8D0C-584BD865DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "matchCriteriaId": "4608EA78-F5CD-42A3-9F25-124ED4A7F792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-256:*:*:*:*:*:*:*", "matchCriteriaId": "FA16DA3E-FD12-475B-997F-C5FDBC13AADA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de proxy web de Cisco AsyncOS Software para Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a mecanismos de validaci\u00f3n de entrada insuficientes para ciertos campos en las solicitudes HTTP/HTTPS enviadas a trav\u00e9s de un dispositivo afectado. Un atacante con \u00e9xito podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP/HTTPS malintencionada a trav\u00e9s de un dispositivo afectado. Una vulnerabilidad podr\u00eda permitir que el atacante obligue al dispositivo a detener el procesamiento del tr\u00e1fico, lo que resulta en una condici\u00f3n DoS." } ], "id": "CVE-2019-1884", "lastModified": "2024-11-21T04:37:36.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-04T20:15:10.937", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-17 15:15
Modified
2024-11-21 06:43
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B4174B-CF51-4C89-A45D-98D2373F7A68", "versionEndExcluding": "13.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F7EB41-5A39-41A4-A652-1446DB2CFAE1", "versionEndExcluding": "13.5.4.102", "versionStartIncluding": "13.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E678E750-A5A0-4450-A856-A6A30F204A85", "versionEndExcluding": "14.0.2.020", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en el componente de verificaci\u00f3n de correo electr\u00f3nico DANE (DNS-based Authentication of Named Entities) del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a un manejo insuficiente de errores en la resoluci\u00f3n de nombres DNS por parte del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de mensajes de correo electr\u00f3nico con un formato especial que sean procesados por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar a el dispositivo volverse inalcanzable desde las interfaces de administraci\u00f3n o procesar mensajes de correo electr\u00f3nico adicionales durante un per\u00edodo de tiempo hasta que el dispositivo sea recuperado, resultando en una condici\u00f3n de DoS. Los ataques continuados podr\u00edan causar que el dispositivo quedara completamente inaccesible, resultando en una condici\u00f3n de DoS persistente" } ], "id": "CVE-2022-20653", "lastModified": "2024-11-21T06:43:14.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-17T15:15:09.377", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-07 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/100681 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039288 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100681 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039288 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de detecci\u00f3n de malware en Advanced Malware Protection (AMP) de Cisco AsyncOS Software para Cisco Email Security Appliances (ESAs) podr\u00eda permitir que un atacante remoto no autenticado env\u00ede un archivo adjunto con malware en un email a un usuario final. Esta vulnerabilidad se debe al fallo de AMP en escanear ciertos archivos adjuntos EML que pudieran contener malware. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un email con un adjunto EML manipulado al dispositivo objetivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante omita el filtrado de contenidos y de mensajes de email ESA configurado y dar lugar a que el malware se entregue al usuario final. Productos vulnerables: Esta vulnerabilidad afecta a Cisco AsyncOS Software para Cisco ESA, tanto para m\u00e1quinas virtuales como f\u00edsicas, que est\u00e1n configuradas con filtros de contenidos y mensajes para escanear los archivos de email adjuntos entrantes en los Email Security Appliances. Cisco Bug IDs: CSCuz81533." } ], "id": "CVE-2017-12218", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-07T21:29:00.410", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100681" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039288" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-16 18:15
Modified
2024-11-21 05:44
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3A8C94-CD5C-4309-8F1B-B151B3D091CC", "versionEndExcluding": "12.5.3-035", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE1DE406-EA9E-40DD-B18B-C19DF63EC13B", "versionEndExcluding": "13.0.0-030", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "39DEA2BD-4772-4F8D-9CD2-1BB377ECF64B", "versionEndExcluding": "13.5.3-010", "versionStartIncluding": "13.5", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDC1BE-F1C3-4030-82CE-38D99DC30B5B", "versionEndExcluding": "11.8.3-021", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC6572-4281-45E1-9B33-6993B45E6B4F", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA889DAF-1699-4A22-8A4C-D589F7BF10A8", "versionEndExcluding": "12.5.1-043", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." }, { "lang": "es", "value": "Una vulnerabilidad en la integraci\u00f3n de Cisco Advanced Malware Protection (AMP) for Endpoints de Cisco AsyncOS para Cisco Email Security Appliance (ESA) y Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto no autenticado interceptar el tr\u00e1fico entre un dispositivo afectado y los servidores AMP. Esta vulnerabilidad es debido a una comprobaci\u00f3n inapropiada del certificado cuando un dispositivo afectado establece conexiones TLS. Un atacante tipo \"man-in-the-middle\" podr\u00eda explotar esta vulnerabilidad mediante el envio de un paquete TLS dise\u00f1ado a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante falsificar un host confiable y luego extraer informaci\u00f3n confidencial o alterar determinadas peticiones de la API" } ], "id": "CVE-2021-1566", "lastModified": "2024-11-21T05:44:38.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T18:15:08.710", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-296" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | content_security_management_appliance | 11.4.0-812 | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | email_security_appliance | 11.0.1-hp5-602 | |
cisco | email_security_appliance | 11.1.0-404 | |
cisco | asyncos | * | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance:11.4.0-812:*:*:*:*:*:*:*", "matchCriteriaId": "81DCBF8D-3CE7-430F-A12D-4469FB18433E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C2DF32-0AC3-4AD9-B694-10415A3DE1AF", "versionEndExcluding": "11.0.1-161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF718934-B8EC-4412-B94D-84375546997A", "versionEndIncluding": "12.5.0-633", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.0.1-hp5-602:*:*:*:*:*:*:*", "matchCriteriaId": "EC1116D0-741E-4E64-BA4A-A1A58EF8C583", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "DC71A74D-98EC-4D52-9C57-36B0C38530DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B1E5FC6-C1BC-43BF-A86D-C75A9E9EDA3A", "versionEndExcluding": "11.0.3-251", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AEAEC6-0E7A-4A10-8169-1E6DBC359390", "versionEndExcluding": "12.5.0-059", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA) y Cisco Content Security Management Appliance (SMA), podr\u00eda permitir a un atacante remoto no autenticado causar bloqueos repetidos en algunos procesos internos que son ejecutados en los dispositivos afectados, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS).\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de los archivos adjuntos de correo electr\u00f3nico.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje de correo electr\u00f3nico con un archivo adjunto dise\u00f1ado por medio de un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que procesos espec\u00edficos se bloqueen de manera repetida, resultando en la indisponibilidad total tanto de Cisco Advanced Malware Protection (AMP) como de las funcionalidades de seguimiento de mensajes y en una degradaci\u00f3n severa del rendimiento mientras se procesa el correo electr\u00f3nico.\u0026#xa0;Una vez que los procesos afectados se reinician, el software reanuda el filtrado del mismo archivo adjunto, lo que hace que los procesos afectados se bloqueen y se reinicien nuevamente.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito tambi\u00e9n podr\u00eda permitir al atacante causar una condici\u00f3n DoS repetida. Puede ser requerida una intervenci\u00f3n manual para recuperarse de esta situaci\u00f3n" } ], "id": "CVE-2019-1983", "lastModified": "2024-11-21T04:37:49.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:14.613", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-04 21:15
Modified
2024-11-21 05:19
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.
The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F31D03FB-191E-4D15-8AD0-EAD1CBC52225", "versionEndExcluding": "13.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.\r\n The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email." } ], "id": "CVE-2020-26082", "lastModified": "2024-11-21T05:19:12.007", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-04T21:15:10.787", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-06 20:15
Modified
2024-11-21 06:10
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "706A904F-2F7D-41E2-AA14-4A6F2E089507", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D31D5B5B-F0AC-4F6F-82CC-59F2256C94EB", "versionEndExcluding": "12.5.2-007", "versionStartIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF9EB09B-AF00-487B-9AB3-5ECB2E700260", "versionEndExcluding": "14.0.1-014", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*", "matchCriteriaId": "E401F29A-026F-4097-B513-47911CB3AA09", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3B097B-F689-4886-A0C6-B71ECAD783CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C3AECC-9270-42B5-A36E-208AA0B48D93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5290B9CF-CF7D-4762-B5EE-5DAEA03C6409", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE85462C-079B-4488-AB0E-989D41EB7AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A8E5E8-8361-4BC8-BFA9-CAE4745A9C48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBEAFE16-BD4F-4538-9A06-173FB678DB8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." }, { "lang": "es", "value": "Una vulnerabilidad en el servicio proxy de Cisco AsyncOS para Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto no autenticado agotar la memoria del sistema y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a una administraci\u00f3n inapropiada de la memoria en el servicio proxy de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al establecer un gran n\u00famero de conexiones HTTPS al dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el sistema deje de procesar nuevas conexiones, lo que podr\u00eda resultar en una condici\u00f3n de DoS. Nota: Puede ser necesaria una intervenci\u00f3n manual para recuperarse de esta situaci\u00f3n" } ], "id": "CVE-2021-34698", "lastModified": "2024-11-21T06:10:58.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T20:15:08.490", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-08 05:15
Modified
2024-11-21 05:31
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "173DC603-2082-4165-8F90-52599DE17D07", "versionEndIncluding": "13.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam del Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de las URL.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una URL de una manera en particular.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL que est\u00e1n configurados para el dispositivo afectado, lo que podr\u00eda permitir que unas URL maliciosas pasen a trav\u00e9s del dispositivo" } ], "id": "CVE-2020-3568", "lastModified": "2024-11-21T05:31:19.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-08T05:15:15.383", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-04 03:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF6B0854-F5C9-445F-9816-193FDD9E37F7", "versionEndIncluding": "13.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web en el software de Cisco AsyncOS para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado acceder a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de peticiones que son enviadas a la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n dise\u00f1ada a la interfaz de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener las direcciones IP que est\u00e1n configuradas en las interfaces internas del dispositivo afectado. Existe una soluci\u00f3n alternativa que soluciona esta vulnerabilidad" } ], "id": "CVE-2020-3546", "lastModified": "2024-11-21T05:31:17.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-04T03:15:11.120", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-08 19:15
Modified
2024-11-21 05:44
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | web_security_appliance | 11.8.0-429 | |
cisco | web_security_appliance | 11.8.0-453 | |
cisco | asyncos | * | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-429:*:*:*:*:*:*:*", "matchCriteriaId": "06E21E49-87C9-4A3A-B863-2B62840A6EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-453:*:*:*:*:*:*:*", "matchCriteriaId": "8139895F-D814-49BB-BD21-B06046BC8A27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE100155-337B-4C98-8F1D-2BD09321ED74", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "392D682A-BF21-4BE0-B64E-99D64D43DD67", "versionEndExcluding": "12.5.2", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la administraci\u00f3n de la configuraci\u00f3n de Cisco AsyncOS para Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado llevar a cabo una inyecci\u00f3n de comandos y elevar los privilegios a root. Esta vulnerabilidad se presenta debido a que la comprobaci\u00f3n de la entrada XML suministrada por el usuario para la interfaz web es insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad al cargar archivos de configuraci\u00f3n XML dise\u00f1ados que contengan c\u00f3digo de scripting en un dispositivo vulnerable. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Un atacante necesitar\u00eda una cuenta de usuario v\u00e1lida con los derechos para cargar archivos de configuraci\u00f3n para explotar esta vulnerabilidad" } ], "id": "CVE-2021-1359", "lastModified": "2024-11-21T05:44:10.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-08T19:15:08.287", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-112" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-18 06:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/102729 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040221 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040222 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102729 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040221 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040222 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.1.1-005:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB6285-D227-48A4-8386-4AD82B0A1B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.7.2-065:*:*:*:*:*:*:*", "matchCriteriaId": "ACB9AC63-5F22-4CCD-9DDA-D024BF632F5C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." }, { "lang": "es", "value": "Una vulnerabilidad en el shell administrativo de Cisco AsyncOS en Cisco Email Security Appliance (ESA) y Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante local autenticado escale su nivel de privilegios y obtenga acceso root. El atacante necesita tener credenciales de usuario v\u00e1lidas con al menos un nivel de privilegios de un usuario invitado. La vulnerabilidad se debe a una configuraci\u00f3n de red incorrecta en la interfaz de l\u00ednea de comandos shell administrativa. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo objetivo y enviando una serie de comandos manipulados maliciosamente a un shell administrativo. Un exploit podr\u00eda permitir que un atacante obtenga acceso root al dispositivo. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ], "id": "CVE-2018-0095", "lastModified": "2024-11-21T03:37:30.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T06:29:00.753", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102729" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040221" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040222" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-04 20:15
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/109049 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109049 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 10.5.3-025 | |
cisco | web_security_appliance | 11.7.0-fcs-334 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9081B2CB-90C8-428D-91DF-B30DC68AB5BF", "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72CE539-D7A7-41D9-9B0E-727435449E80", "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.3-025:*:*:*:*:*:*:*", "matchCriteriaId": "9B73A407-DD94-455A-BCC2-96A77F9CCA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-334:*:*:*:*:*:*:*", "matchCriteriaId": "F7EE04AC-5EFE-46D2-8B54-E923E90E4601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n de descifrado HTTPS de Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se debe a la validaci\u00f3n insuficiente de los certificados de servidor Secure Sockets Layer (SSL). Un atacante podr\u00eda aprovechar esta vulnerabilidad instalando un certificado con formato incorrecto en un servidor web y envi\u00e1ndole una solicitud a trav\u00e9s de Cisco WSA. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante provocar un reinicio inesperado del proceso de proxy en un dispositivo afectado." } ], "id": "CVE-2019-1886", "lastModified": "2024-11-21T04:37:36.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-04T20:15:11.000", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109049" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-06 16:53
Severity ?
3.4 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.
Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*", "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker." }, { "lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n de la funcionalidad de acceso remoto de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Cisco Secure Email Gateway y Cisco Secure Web Appliance podr\u00eda permitir que un atacante local autenticado eleve los privilegios a superusuario. El atacante debe autenticarse con credenciales de administrador v\u00e1lidas. Esta vulnerabilidad se debe a una falla arquitect\u00f3nica en el algoritmo de generaci\u00f3n de contrase\u00f1as para la funcionalidad de acceso remoto. Un atacante podr\u00eda explotar esta vulnerabilidad generando una contrase\u00f1a temporal para la cuenta de servicio. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios como superusuario y acceder al sistema operativo subyacente. Nota: La calificaci\u00f3n de impacto de seguridad (SIR) para esta vulnerabilidad es media debido al alcance ilimitado de la informaci\u00f3n a la que puede acceder un atacante." } ], "id": "CVE-2025-20185", "lastModified": "2025-08-06T16:53:52.867", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.883", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-10 22:29
Modified
2024-11-21 03:50
Severity ?
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/106507 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106507 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B8FDFFB-2C0D-4D16-9EBB-E7D2C8146510", "versionEndExcluding": "11.0.2-044_md", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E00BFAD3-004E-4F6F-BA74-ACB6AD05970A", "versionEndExcluding": "11.1.2-023_md", "versionStartIncluding": "11.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliances (ESA) podr\u00eda permitir que un atacante remoto no autenticado aumente el uso de la CPU hasta el 100 por ciento, provocando una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe al filtrado incorrecto de mensajes de email que contienen referencias a URL en lista blanca. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un mensaje de correo electr\u00f3nico malicioso que contiene un gran n\u00famero de URL en lista blanca. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque una condici\u00f3n continuada de denegaci\u00f3n de servicio (DoS) que podr\u00eda forzar al dispositivo afectado a que pare de escanear y reenviar mensajes de correo electr\u00f3nico." } ], "id": "CVE-2018-15460", "lastModified": "2024-11-21T03:50:51.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-10T22:29:00.237", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106507" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-19 01:55
Modified
2025-04-12 10:46
Severity ?
Summary
The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1ED121A-E76C-4256-A2BB-B44E9FC85B9B", "versionEndIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." }, { "lang": "es", "value": "El motor de inspecci\u00f3n ZIP en Cisco AsyncOS 8.5 y anteriores en Cisco Email Security Appliance (ESA) no analiza correctamente los archivos ZIP, lo que permite a atacantes remotos evadir la filtraci\u00f3n de malware a trav\u00e9s de un archivo manipulado, tambi\u00e9n conocido como Bug ID CSCup07934." } ], "id": "CVE-2014-3381", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-19T01:55:13.607", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-01 08:15
Modified
2024-11-21 06:43
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.
This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F123F722-4765-49AE-AFE7-C889F3658C57", "versionEndExcluding": "14.0.4", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "23EC2FAD-D9BF-450F-989E-ED862E263F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "id": "CVE-2022-20952", "lastModified": "2024-11-21T06:43:54.277", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-01T08:15:10.270", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-18 16:15
Modified
2025-08-11 17:32
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC0CD03-0E5A-44FE-A973-B658537B2AAF", "versionEndExcluding": "13.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F73AEFE-EAC5-4E2D-AECD-B1D5DE7B0029", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "24206121-4F6F-4268-B1F4-41974596C657", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADDCAB99-22C9-41B2-B981-06F7911CB2F0", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "89795801-953E-4D11-8F86-4394DD4582AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "14B41A69-AFB0-4770-A8F4-82393F5B330F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "3582C8AF-36B0-49C4-9951-3D3745D38C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF84B5E-64EE-4F31-BD99-C869DA3C73E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEEF3CE3-2A24-42CB-B73E-A6C6333A93E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E54E9E-6FCA-4951-9162-35F9F57B6856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad existe porque se incluye informaci\u00f3n confidencial en las solicitudes HTTP que se intercambian entre el usuario y el dispositivo. Un atacante podr\u00eda aprovechar esta vulnerabilidad al observar las solicitudes HTTP sin procesar que se env\u00edan a la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as que se configuran en toda la interfaz. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad." } ], "id": "CVE-2021-1425", "lastModified": "2025-08-11T17:32:43.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-18T16:15:10.180", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-201" } ], "source": "psirt@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-05 19:28
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-429:*:*:*:*:*:*:*", "matchCriteriaId": "D1C5CF4F-FB9C-4497-8D4F-ACF0B5619B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-453:*:*:*:*:*:*:*", "matchCriteriaId": "2F1D538A-A548-43B2-91A6-104E7E048D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.4-004:*:*:*:*:*:*:*", "matchCriteriaId": "01D81165-118F-49C9-8F81-282ECC09A31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-334:*:*:*:*:*:*:*", "matchCriteriaId": "D00FA43A-4E47-401E-A3EB-5DD1DD01D731", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-004:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D5C72-C85D-4D5F-8290-2158737A8AF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "0A30D4E9-7199-4841-8FB3-61123E155B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-005:*:*:*:*:*:*:*", "matchCriteriaId": "86F3D9B3-B5FB-4F8A-929E-B6EFD731739F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.4-002:*:*:*:*:*:*:*", "matchCriteriaId": "D061F30A-E46B-4771-9E9A-45C198A31140", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.5-011:*:*:*:*:*:*:*", "matchCriteriaId": "2B982C95-2AA6-466A-9D29-A9BECFD97502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-043:*:*:*:*:*:*:*", "matchCriteriaId": "A6206A35-E1A4-4B6D-9C9F-16F06C6148BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "2536DCE8-4F1D-4056-A021-409B54C86ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "2D75C030-216E-4019-ABA5-6DB662C6755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-011:*:*:*:*:*:*:*", "matchCriteriaId": "2FC0B862-5248-42D1-BB20-F957DD98A585", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-005:*:*:*:*:*:*:*", "matchCriteriaId": "654F0E3A-EEE2-4111-8E80-6C4B78EA5CBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-008:*:*:*:*:*:*:*", "matchCriteriaId": "D77BA3B2-D2B5-4A62-BE5C-F5A38736D285", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*", "matchCriteriaId": "09EA2D4E-2E11-40E9-ABA0-7643B6A78857", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-014:*:*:*:*:*:*:*", "matchCriteriaId": "14B69F30-9430-4FA0-8BED-515C26D36788", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-040:*:*:*:*:*:*:*", "matchCriteriaId": "B69B7B51-55D4-4346-84BC-5B8226251BC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "AF47A58B-9D1D-44C2-95DD-5413B8F8A6CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.1-503:*:*:*:*:*:*:*", "matchCriteriaId": "D024F9E1-004C-4639-A057-B2F4238CA3B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "07433741-D7ED-4742-B449-64D23E002E75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "A1C5EDF4-868A-43B9-B5BA-0F62984F7BE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-041:*:*:*:*:*:*:*", "matchCriteriaId": "45B7B8BB-91DA-490B-BA54-27AD44F862A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-047:*:*:*:*:*:*:*", "matchCriteriaId": "16B7F282-1F20-4C84-A13E-C671BAE3F8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-537:*:*:*:*:*:*:*", "matchCriteriaId": "567CFC71-7AE1-456D-B87F-FDA4CDFA0936", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-673:*:*:*:*:*:*:*", "matchCriteriaId": "03F9301C-A93C-4D12-9C4B-E4D984D136D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-510:*:*:*:*:*:*:*", "matchCriteriaId": "F615EBAA-EF52-4431-8080-2CF34269BE28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-607:*:*:*:*:*:*:*", "matchCriteriaId": "1FE4CBC9-5786-4896-9FF7-C22E02FC9428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "134FF12A-15FB-4D3D-BA99-479C8EEE534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.3-033:*:*:*:*:*:*:*", "matchCriteriaId": "E3219303-FBC6-43FD-A712-63DACA8A6D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*", "matchCriteriaId": "0FD96D2A-EE17-4AF6-B8DD-E25F4DCB9313", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-355:*:*:*:*:*:*:*", "matchCriteriaId": "CCD55688-9581-4363-B8A0-2CC4080EA720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.1.0-287:*:*:*:*:*:*:*", "matchCriteriaId": "E1595FF1-D7A9-402C-B8D0-C2ED6E195637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-116:*:*:*:*:*:*:*", "matchCriteriaId": "9D0F8BE7-992B-455B-8D64-4B0A79B53131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.2.0-164:*:*:*:*:*:*:*", "matchCriteriaId": "28BDB938-CB66-457E-BEE6-B115A1E990B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BCBB0F-88F1-4469-A7D4-DA8BCAF5470A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F88A369-E3A2-431A-AB71-CCD4F15E68EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8ED2A4-8E08-420D-B377-6D1F5AF675DC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "780EA177-5623-4AFF-9316-D557BE2BD47D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1F2FAF-C64B-4AEB-8DE4-329C61B8D17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5596058-16DB-46C0-82AC-D9BFC13F4126", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BEA59D-2AF1-4BDF-ACB3-450BED2E5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance." }, { "lang": "es", "value": "Una vulnerabilidad en una implementaci\u00f3n basada en pol\u00edticas de Cisco Application Visibility and Control (AVC) de Cisco AsyncOS Software para Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto no autenticado eluda el esc\u00e1ner antivirus y descargue un archivo malicioso en un endpoint. La vulnerabilidad se debe a una gesti\u00f3n inadecuada de un encabezado de solicitud de rango manipulado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP con un encabezado de solicitud de rango manipulado a trav\u00e9s del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante eluda el esc\u00e1ner antivirus y descargue malware en el endpoint sin que Cisco Secure Web Appliance lo detecte." } ], "id": "CVE-2025-20183", "lastModified": "2025-08-05T19:28:30.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.527", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-01 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory | |
psirt@cisco.com | http://www.securityfocus.com/bid/92155 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1036470 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92155 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036470 | Broken Link, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A80953D2-88BB-40A5-A235-90777B3DC601", "versionEndIncluding": "9.7.0-125", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." }, { "lang": "es", "value": "Cisco AsyncOS en dispositivos Email Security Appliance (ESA) hasta la versi\u00f3n 9.7.0-125 permite a atacantes remotos eludir la detecci\u00f3n de malware a trav\u00e9s de un adjunto manipulado en un mensaje de e-mail, tambi\u00e9n conocido como Bug ID CSCuz14932." } ], "id": "CVE-2016-1461", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-01T02:59:00.167", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92155" }, { "source": "psirt@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036470" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-06 16:48
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack.
This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.0.3-238 | |
cisco | asyncos | 11.1.0-069 | |
cisco | asyncos | 11.1.0-128 | |
cisco | asyncos | 12.0.0-419 | |
cisco | asyncos | 12.1.0-071 | |
cisco | asyncos | 12.1.0-087 | |
cisco | asyncos | 12.1.0-089 | |
cisco | asyncos | 12.5.0-066 | |
cisco | asyncos | 12.5.3-041 | |
cisco | asyncos | 12.5.4-041 | |
cisco | asyncos | 13.0.0-392 | |
cisco | asyncos | 13.0.5-007 | |
cisco | asyncos | 13.5.1-277 | |
cisco | asyncos | 13.5.4-038 | |
cisco | asyncos | 14.0.0-698 | |
cisco | asyncos | 14.2.0-620 | |
cisco | asyncos | 14.2.1-020 | |
cisco | asyncos | 14.3.0-032 | |
cisco | asyncos | 15.0.0-104 | |
cisco | asyncos | 15.0.1-030 | |
cisco | asyncos | 15.5.0-048 | |
cisco | secure_email_gateway_virtual_appliance_c100v | - | |
cisco | secure_email_gateway_virtual_appliance_c300v | - | |
cisco | secure_email_gateway_virtual_appliance_c600v | - | |
cisco | secure_email_gateway_c195 | - | |
cisco | secure_email_gateway_c395 | - | |
cisco | secure_email_gateway_c695 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:*", "matchCriteriaId": "B9440FAD-6BE1-4550-8149-2CFF126EBFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:*", "matchCriteriaId": "779EC449-8CA2-4DAD-B59A-022C074236BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:*", "matchCriteriaId": "6F54F1B9-9765-445D-AE5E-C42281B3D50E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:*", "matchCriteriaId": "C16601C4-8B80-427A-8CCA-A0470F61848E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:*", "matchCriteriaId": "F53FC4B6-BBD2-410A-AF02-2C2C22B09B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:*", "matchCriteriaId": "F976B1FD-16F1-4F3E-8C0D-B0EFB0628436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:*", "matchCriteriaId": "CF52987D-3E2D-48A6-AA42-FA824572A25E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:*", "matchCriteriaId": "C24A52A2-DA64-4076-ACFE-2F2D42877D5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1EBF-C2E7-46C0-8863-6BD7415CC88D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:*", "matchCriteriaId": "3FED2AC8-7F6C-4653-BF1F-878A59174C55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. \r\n\r This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la API de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de divisi\u00f3n de respuesta HTTP. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de algunos par\u00e1metros que se pasan a la API de administraci\u00f3n basada en web del sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante realizar ataques de cross-site scripting (XSS), lo que dar\u00eda como resultado la ejecuci\u00f3n de c\u00f3digo de script arbitrario en el navegador del usuario objetivo, o podr\u00eda permitir que el atacante acceda a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2024-20392", "lastModified": "2025-08-06T16:48:40.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T18:15:10.390", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-113" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-18 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA8D0F-6BF0-4E06-8055-8720ED3ADD16", "versionEndExcluding": "11.7.2-011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2483ED5-35F5-4E2F-B308-2293D9F115E2", "versionEndExcluding": "11.8.2-009", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB33545E-F920-4B6D-838F-9C6DAD0323C5", "versionEndExcluding": "12.0.2", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "362A3154-5E4E-453A-BA69-4967B15FFB81", "versionEndExcluding": "12.5.1-011", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." }, { "lang": "es", "value": "Una vulnerabilidad en el subsistema de suscripci\u00f3n de registros de Cisco AsyncOS para Cisco Secure Web Appliance (anteriormente Web Security Appliance), podr\u00eda permitir a un atacante local autenticado llevar a cabo la inyecci\u00f3n de comandos y elevar los privilegios a root.\u0026#xa0;Esta vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por el usuario hacia la interfaz web y CLI.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en el dispositivo afectado e inyectar comandos de scripting en el \u00e1mbito del subsistema de suscripci\u00f3n de registros.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root" } ], "id": "CVE-2020-3367", "lastModified": "2024-11-21T05:30:53.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-18T18:15:12.480", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-14 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en la p\u00e1gina IronPort Spam Quarantine (ISQ) en Cisco AsyncOS, utilizado en Cisco Email Security Appliance (ESA) y Content Security Management Appliance (SMA), permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de par\u00e1metro no especificados, tambi\u00e9n conocido como Bug IDs CSCus22925 y CSCup08113." } ], "id": "CVE-2015-0577", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-14T19:59:01.600", "references": [ { "source": "psirt@cisco.com", "url": "http://secunia.com/advisories/62289" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/72056" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1031544" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-23 00:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 9.7.0-125 | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.7.0-125:*:*:*:*:*:*:*", "matchCriteriaId": "B61836C4-3E3F-4D80-9919-ECBB9587F035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." }, { "lang": "es", "value": "Cisco AsyncOS 9.7.0-125 en dispositivos Email Security Appliance (ESA) permite a atacantes remotos eludir el filtrado de spam previsto a trav\u00e9s de contenido ejecutable manipulado en un archivo ZIP, tambi\u00e9n conocido como Bug ID CSCuy39210." } ], "id": "CVE-2016-1438", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-23T00:59:07.037", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1036156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036156" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3202803F-9125-40A6-B07D-7EAB3CD2279C", "versionEndExcluding": "13.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de las URL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar la URL de una manera particular. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL configurados para el dispositivo afectado, lo que podr\u00eda permitir que las URL maliciosas pasen por medio del dispositivo" } ], "id": "CVE-2020-3368", "lastModified": "2024-11-21T05:30:53.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:14.793", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 17:15
Modified
2025-08-15 20:36
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*", "matchCriteriaId": "80439833-447F-4582-B1FA-278306ABFE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*", "matchCriteriaId": "29CB6A5B-34EE-4958-ACB5-6433E8C0014D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-249:*:*:*:*:*:*:*", "matchCriteriaId": "9332990D-7532-4CE6-A02B-81B9445C09F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*", "matchCriteriaId": "C18D9472-A7E4-4083-9369-DBA97A40022B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.1-201:*:*:*:*:*:*:*", "matchCriteriaId": "FF1F8E93-E5CF-4C73-BFFA-2B3DB2C764BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-023:*:*:*:*:*:*:*", "matchCriteriaId": "86750D2A-0D2D-4775-B7B6-261337F3F72D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*", "matchCriteriaId": "8A1365DA-3163-4CFF-9F48-1998C9F6A29B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-052:*:*:*:*:*:*:*", "matchCriteriaId": "4D26ED91-0192-4606-B304-2BD926A4E854", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*", "matchCriteriaId": "2C5B0C94-A72F-4B5A-A9F8-00EF60D6C001", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*", "matchCriteriaId": "74C14467-2836-4FDF-8B4B-670D08511614", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*", "matchCriteriaId": "E50DAB07-5582-47C8-A0B0-7C0DA63DC70A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "2F540FA5-3E48-4C4E-8AAF-4DD8629DAF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*", "matchCriteriaId": "BC8211F5-85F9-449D-87E0-991F009AFD1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-203:*:*:*:*:*:*:*", "matchCriteriaId": "2D9CA168-015D-4962-BB8D-E5BB10925D1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*", "matchCriteriaId": "253C1306-4BCE-4314-A57D-CBFDF89386E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*", "matchCriteriaId": "6F90AF26-41D8-40B9-9E49-29C27CA2B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*", "matchCriteriaId": "E1719C5F-39A9-4F56-AF18-AB34A9D73DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*", "matchCriteriaId": "6C1A7437-AEF6-4426-91E8-4112F76FE019", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-024:*:*:*:*:*:*:*", "matchCriteriaId": "49913B5D-22C6-41E6-9FAD-3AEB1DD96350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-029:*:*:*:*:*:*:*", "matchCriteriaId": "B24DBD60-73D9-4999-8F3C-2D9F7653414D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-005:*:*:*:*:*:*:*", "matchCriteriaId": "F571B6DA-9940-4B08-8A7F-7A4B0B36ACB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-195:*:*:*:*:*:*:*", "matchCriteriaId": "5B49B71D-89F0-40B0-B93F-2C038583C367", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9613A5-B198-4AD2-BC74-F21ABAF79174", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "57831FD6-1CF3-4ABE-81BA-2576418F9083", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E804AE-4743-44AD-A364-504B0AB0D9BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "3057023B-AD68-4953-A780-75EA416A7B94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87164B6-4717-4968-86F7-C62EB677FC50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD81D0-D81A-4361-B4E8-D674732A2A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28903F8-3C4D-4337-9721-CEC108A7E2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "84ACD394-2E45-4E8E-A342-AC57935C7038", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6112D56B-B68B-40B0-8EB9-3315533110C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1198BC-C934-4C26-887D-D599E8128FD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "10374BA0-E7DD-4930-8C58-251F98B75A11", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD265B49-C691-44B3-A505-DC704E80313C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37CFC3A-1752-4C66-BD32-CFFA46C3E6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "830693AC-A737-43B9-BBB4-E3A1C950C47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE94BE-6A3A-4873-BFCF-93E550F099A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:*", "matchCriteriaId": "A787134E-F72F-4543-8F0E-3125A982BE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:*", "matchCriteriaId": "E8E06464-FA10-4AA0-8320-FED11EF0B5ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:*", "matchCriteriaId": "B6B6F533-7521-4DC1-8481-034E6CDE22DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:*", "matchCriteriaId": "6A48B45C-E1B4-4524-A095-631C408044A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:*", "matchCriteriaId": "A84B29E7-CB57-4DA8-BA2F-77AA4DB9C394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "189C0A83-6BF1-45AD-ACC1-FB7561B901A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:*", "matchCriteriaId": "6B09FBBD-C6BD-4BBD-8DF4-416D59E1E97C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:*", "matchCriteriaId": "943D850B-D6B1-4B02-BBF6-687C3FD80AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:*", "matchCriteriaId": "74FB1274-8F04-4A8A-986F-225BBA4553E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.0.3-002:*:*:*:*:*:*:*", "matchCriteriaId": "E10CE9B3-6B35-49CB-8DB6-2AF2D4678417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:*", "matchCriteriaId": "05560A50-4EF9-42E9-B8B3-FC99C77089B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.1-055:*:*:*:*:*:*:*", "matchCriteriaId": "421FFF79-BA3D-4968-928C-6F792E9A34AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:15.5.2-018:*:*:*:*:*:*:*", "matchCriteriaId": "700129D1-EEB8-4A05-9E32-7C425CAA54F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-050:*:*:*:*:*:*:*", "matchCriteriaId": "4C829294-B71F-4201-8BF0-623D45E93C7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:16.0.0-054:*:*:*:*:*:*:*", "matchCriteriaId": "7176E776-01D3-432F-BD8C-38B15AAF62F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6FBC8A-8187-4903-B786-6CF341C142B5", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "68864429-9730-43E9-96C3-20B9035BB291", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8B2B-E9AE-4B02-87BD-9CF9FA95906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1322B8-1CF9-4B17-9A58-38788051ED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:*", "matchCriteriaId": "139A640B-1957-4953-AA88-9D373A5152D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08EA2AD-618B-4834-A52D-73F6A4502DF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager y Secure Email Gateway podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales v\u00e1lidas para una cuenta de usuario con al menos el rol de Operador." } ], "id": "CVE-2025-20180", "lastModified": "2025-08-15T20:36:40.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Primary" } ] }, "published": "2025-02-05T17:15:25.370", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-21 05:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/100920 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039414 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100920 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039414 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDBDE866-1A7E-4D06-9753-09CA2748E336", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "66B4BD6E-05A1-46F8-AD08-C57A15DAD389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECE65F11-D473-404B-AA99-68EFBC6855DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "8FC71421-BBED-4EEB-991A-650698F1862A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A838252C-3B2A-4D80-99AA-9C88D13D751C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.7:*:*:*:*:*:*:*", "matchCriteriaId": "38DA5A67-D93C-4AAF-A8CB-E3CB1ECAD7FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0E7EB49-7E83-44DB-8462-AE1241A239D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." }, { "lang": "es", "value": "Una vulnerabilidad en la caracter\u00edstica de filtrado de mensajes de correo de Cisco AsyncOS Software para Cisco Email Security Appliance podr\u00eda permitir a un atacante autenticado remoto provocar que el dispositivo afectado agote su memoria y deje de escanear y reenviar mensajes de correo. Agotar la memoria del sistema puede provocar el cierre inesperado del proceso de filtrado, resultando en una denegaci\u00f3n de servicio (DoS) en el dispositivo. Esta vulnerabilidad afecta desde la versi\u00f3n de software 9.0 hasta la primera distribuci\u00f3n corregida de Cisco AsyncOS Software para Cisco Email Security Appliances, tanto para m\u00e1quinas virtuales como f\u00edsicas, si el software se configura para aplicar un filtro de mensaje o de contenido a los archivos adjuntos de email entrantes. Esta vulnerabilidad no se limita a reglas o acciones espec\u00edficas para un filtro de mensaje o de contenido. Cisco Bug IDs: CSCvd29354." } ], "id": "CVE-2017-12215", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-21T05:29:00.277", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100920" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039414" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-06 19:15
Modified
2024-11-21 06:43
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | secure_email_and_web_manager | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B09056C-2EA0-42EC-BB1E-5CC21004BBA9", "versionEndExcluding": "14.02.0-020", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C660070-35AF-4D48-A90D-E3BFFE161503", "versionEndExcluding": "14.1.0-239", "versionStartIncluding": "12.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBEE74B8-1D30-4A2C-B720-7E61CA134C89", "versionEndExcluding": "14.0.2-012", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la pila TCP/IP de Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA) y Cisco Secure Email and Web Manager, anteriormente Security Management Appliance, podr\u00eda permitir a un atacante remoto no autenticado bloquear el Servicio del Protocolo Simple de Administrador de Redes (SNMP), resultando en una situaci\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido a una escucha de puerto abierta en el puerto TCP 199. Un atacante podr\u00eda explotar esta vulnerabilidad al conectarse al puerto TCP 199. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante bloquear el servicio SNMP, resultando en una condici\u00f3n de DoS" } ], "id": "CVE-2022-20675", "lastModified": "2024-11-21T06:43:17.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.007", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-248" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-1983 (GCVE-0-2019-1983)
Vulnerability from cvelistv5
Published
2020-09-23 00:25
Modified
2024-11-13 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1983", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:03.559721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:05:42.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T00:25:56", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "source": { "advisory": "cisco-sa-20200219-esa-sma-dos", "defect": [ [ "CSCvo89182", "CSCvo89192" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-19T16:00:00", "ID": "CVE-2019-1983", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ] }, "source": { "advisory": "cisco-sa-20200219-esa-sma-dos", "defect": [ [ "CSCvo89182", "CSCvo89192" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1983", "datePublished": "2020-09-23T00:25:56.648526Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-13T18:05:42.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3367 (GCVE-0-2020-3367)
Vulnerability from cvelistv5
Published
2020-11-18 17:40
Modified
2024-11-13 17:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:22:09.659342Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:38:34.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T17:40:59", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "source": { "advisory": "cisco-sa-wsa-prv-esc-nPzWZrQj", "defect": [ [ "CSCvs65863" ] ], "discovery": "INTERNAL" }, "title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-11-18T16:00:00", "ID": "CVE-2020-3367", "STATE": "PUBLIC", "TITLE": "Cisco Secure Web Appliance Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ] }, "source": { "advisory": "cisco-sa-wsa-prv-esc-nPzWZrQj", "defect": [ [ "CSCvs65863" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3367", "datePublished": "2020-11-18T17:40:59.859609Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:38:34.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3122 (GCVE-0-2020-3122)
Vulnerability from cvelistv5
Published
2025-03-04 18:22
Modified
2025-03-04 18:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco IronPort Security Management Appliance |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2020-3122", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T18:26:53.334394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T18:27:11.025Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IronPort Security Management Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.0(Ritz)-128" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T18:22:12.411Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "CSCvr92383", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr92383" } ], "source": { "advisory": "", "defects": [ "CSCvr92383" ], "discovery": "EXTERNAL" }, "title": "Cisco Content Security Management Appliance Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3122", "datePublished": "2025-03-04T18:22:12.411Z", "dateReserved": "2019-12-12T00:00:00.000Z", "dateUpdated": "2025-03-04T18:27:11.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-0087 (GCVE-0-2018-0087)
Vulnerability from cvelistv5
Published
2018-03-08 07:00
Modified
2024-12-02 20:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Web Security Appliance |
Version: Cisco Web Security Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040464" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0087", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:55:02.579825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T20:59:59.861Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Web Security Appliance" } ] } ], "datePublic": "2018-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "103407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040464" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Web Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "103407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103407" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040464" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0087", "datePublished": "2018-03-08T07:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T20:59:59.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1438 (GCVE-0-2016-1438)
Vulnerability from cvelistv5
Published
2016-06-23 00:00
Modified
2024-08-05 22:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036156", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-28T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1036156", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036156", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1438", "datePublished": "2016-06-23T00:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20215 (GCVE-0-2023-20215)
Vulnerability from cvelistv5
Published
2023-08-03 21:16
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-202 - Exposure of Sensitive Information Through Data Queries
Summary
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.
This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 14.5.0-498 Version: 14.5.1-016 Version: 14.0.3-014 Version: 14.0.2-012 Version: 14.0.4-005 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-wsa-bypass-vXvqwzsj", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.0.4-005" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-202", "description": "Exposure of Sensitive Information Through Data Queries", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:20.215Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-wsa-bypass-vXvqwzsj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "source": { "advisory": "cisco-sa-wsa-bypass-vXvqwzsj", "defects": [ "CSCwf60901", "CSCwf55917", "CSCwf94501" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20215", "datePublished": "2023-08-03T21:16:38.159Z", "dateReserved": "2022-10-27T18:47:50.368Z", "dateUpdated": "2024-08-02T09:05:35.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34698 (GCVE-0-2021-34698)
Vulnerability from cvelistv5
Published
2021-10-06 19:46
Modified
2024-11-07 21:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34698", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:47:20.698422Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:47:53.922Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T19:46:52", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "source": { "advisory": "cisco-sa-wsa-dos-fmHdKswk", "defect": [ [ "CSCvv43704", "CSCvw11261", "CSCvz00720" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34698", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-401" } ] } ] }, "references": { "reference_data": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ] }, "source": { "advisory": "cisco-sa-wsa-dos-fmHdKswk", "defect": [ [ "CSCvv43704", "CSCvw11261", "CSCvz00720" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34698", "datePublished": "2021-10-06T19:46:52.857611Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:47:53.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20435 (GCVE-0-2024-20435)
Vulnerability from cvelistv5
Published
2024-07-17 16:27
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Summary
A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 12.5.6-008 Version: 14.5.0-498 Version: 14.5.1-016 Version: 14.5.2-011 Version: 14.0.3-014 Version: 14.0.2-012 Version: 14.0.4-005 Version: 14.0.5-007 Version: 15.0.0-322 Version: 15.0.0-355 Version: 15.1.0-287 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:cisco:secure_web_appliance:11.7.0-406:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.7.0-418:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-006:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-020:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.7.1-049:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.7.2-011:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.8.0-414:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.8.1-023:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.8.3-018:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:11.8.3-021:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.0.1-268:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.0.3-007:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.5.1-011:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.5.2-007:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.5.4-005:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.5.5-004:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:12.5.6-008:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.0.2-012:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.0.3-014:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.0.4-005:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.0.5-007:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.5.0-498:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.5.1-016:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:14.5.2-011:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:15.0.0-322:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:15.0.0-355:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:secure_web_appliance:15.1.0-287:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_web_appliance", "vendor": "cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.1.0-287" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-17T17:15:02.287832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T17:28:04.667Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-swa-priv-esc-7uHpZsCC", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.1.0-287" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "Execution with Unnecessary Privileges", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-17T16:27:59.858Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-swa-priv-esc-7uHpZsCC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC" } ], "source": { "advisory": "cisco-sa-swa-priv-esc-7uHpZsCC", "defects": [ "CSCwj30015" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20435", "datePublished": "2024-07-17T16:27:59.858Z", "dateReserved": "2023-11-08T15:08:07.667Z", "dateUpdated": "2024-08-01T21:59:42.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2195 (GCVE-0-2014-2195)
Vulnerability from cvelistv5
Published
2014-05-20 10:00
Modified
2024-08-06 10:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-16T13:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030258" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2195", "datePublished": "2014-05-20T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3546 (GCVE-0-2020-3546)
Vulnerability from cvelistv5
Published
2020-09-04 02:25
Modified
2024-11-13 18:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:54.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3546", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:06.166292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:09:21.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T02:25:16", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "source": { "advisory": "cisco-sa-esa-info-disclosure-vMJMMgJ", "defect": [ [ "CSCvp01770" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-02T16:00:00", "ID": "CVE-2020-3546", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ] }, "source": { "advisory": "cisco-sa-esa-info-disclosure-vMJMMgJ", "defect": [ [ "CSCvp01770" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3546", "datePublished": "2020-09-04T02:25:16.615739Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:09:21.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34741 (GCVE-0-2021-34741)
Vulnerability from cvelistv5
Published
2021-11-04 15:40
Modified
2024-11-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34741", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:44:16.445690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:44:52.277Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-04T15:40:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "source": { "advisory": "cisco-sa-esa-dos-JOm9ETfO", "defect": [ [ "CSCvy59938" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-11-03T16:00:00", "ID": "CVE-2021-34741", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ] }, "source": { "advisory": "cisco-sa-esa-dos-JOm9ETfO", "defect": [ [ "CSCvy59938" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34741", "datePublished": "2021-11-04T15:40:17.777881Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:44:52.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20185 (GCVE-0-2025-20185)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Summary
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.
Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 13.5.1-277 Version: 13.0.0-392 Version: 14.2.0-620 Version: 13.0.5-007 Version: 13.5.4-038 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 Version: 15.5.2-018 Version: 15.0.3-002 |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20185", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:59:20.922545Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:59:47.445Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" }, { "status": "affected", "version": "15.5.2-018" }, { "status": "affected", "version": "15.0.3-002" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.6.2-023" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.0.0-249" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.8.1-052" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "13.6.1-201" }, { "status": "affected", "version": "14.2.0-203" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" }, { "status": "affected", "version": "15.5.1-024" }, { "status": "affected", "version": "15.5.1-029" }, { "status": "affected", "version": "15.5.2-005" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-453" }, { "status": "affected", "version": "12.5.3-002" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.0.3-005" }, { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "12.0.4-002" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "11.8.4-004" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.2-011" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.4-011" }, { "status": "affected", "version": "12.0.5-011" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.5-005" }, { "status": "affected", "version": "12.5.5-008" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "12.0.2-012" }, { "status": "affected", "version": "12.0.2-004" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" }, { "status": "affected", "version": "15.0.1-004" }, { "status": "affected", "version": "15.2.1-011" }, { "status": "affected", "version": "14.5.0-673" }, { "status": "affected", "version": "14.5.0-537" }, { "status": "affected", "version": "12.0.1-334" }, { "status": "affected", "version": "14.0.1-503" }, { "status": "affected", "version": "14.0.1-053" }, { "status": "affected", "version": "11.8.0-429" }, { "status": "affected", "version": "14.0.1-040" }, { "status": "affected", "version": "14.0.1-014" }, { "status": "affected", "version": "12.5.1-043" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "Execution with Unnecessary Privileges", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:38.541Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "defects": [ "CSCwk70576" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20185", "datePublished": "2025-02-05T16:14:38.541Z", "dateReserved": "2024-10-10T19:15:13.226Z", "dateUpdated": "2025-02-05T16:59:47.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20675 (GCVE-0-2022-20675)
Vulnerability from cvelistv5
Published
2022-04-06 18:13
Modified
2024-11-06 16:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:17:53.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20675", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T16:01:49.578940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:28:19.864Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:13:42", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "source": { "advisory": "cisco-sa-ESA-SNMP-JLAJksWK", "defect": [ [ "CSCwa06167", "CSCwa07400", "CSCwa08629" ] ], "discovery": "INTERNAL" }, "title": "Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20675", "STATE": "PUBLIC", "TITLE": "Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-248" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ] }, "source": { "advisory": "cisco-sa-ESA-SNMP-JLAJksWK", "defect": [ [ "CSCwa06167", "CSCwa07400", "CSCwa08629" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20675", "datePublished": "2022-04-06T18:13:42.752369Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:28:19.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20258 (GCVE-0-2024-20258)
Vulnerability from cvelistv5
Published
2024-05-15 17:32
Modified
2024-08-01 21:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:secure_email:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "15.5.0-048", "status": "affected", "version": "11.0.3-238", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email_and_web_manager", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "15.0.0-334", "status": "affected", "version": "9.0.0-087", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20258", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T17:18:20.336833Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:25.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.0.0-087" }, { "status": "affected", "version": "11.0.0-115" }, { "status": "affected", "version": "11.0.1-161" }, { "status": "affected", "version": "11.5.1-105" }, { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:32:16.125Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwf84882", "CSCwj12619", "CSCwf93368" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20258", "datePublished": "2024-05-15T17:32:16.125Z", "dateReserved": "2023-11-08T15:08:07.623Z", "dateUpdated": "2024-08-01T21:52:31.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1425 (GCVE-0-2021-1425)
Vulnerability from cvelistv5
Published
2024-11-18 15:36
Modified
2024-11-18 15:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-201 - Exposure of Sensitive Information Through Sent Data
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email and Web Manager |
Version: N/A |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1425", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:58:03.148324Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:58:19.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "Exposure of Sensitive Information Through Sent Data", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:36:48.271Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ" } ], "source": { "advisory": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ", "defects": [ "CSCvw39308" ], "discovery": "EXTERNAL" }, "title": "Cisco Cisco Email Security Appliance and Content Security Management Appliance Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1425", "datePublished": "2024-11-18T15:36:48.271Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:58:19.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20183 (GCVE-0-2025-20183)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.
The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Web Appliance |
Version: 11.8.0-453 Version: 12.5.3-002 Version: 12.0.3-007 Version: 12.0.3-005 Version: 14.1.0-032 Version: 14.1.0-047 Version: 14.1.0-041 Version: 12.0.4-002 Version: 14.0.2-012 Version: 11.8.0-414 Version: 12.0.1-268 Version: 11.8.1-023 Version: 11.8.3-021 Version: 11.8.3-018 Version: 12.5.1-011 Version: 11.8.4-004 Version: 12.5.2-007 Version: 12.5.2-011 Version: 14.5.0-498 Version: 12.5.4-005 Version: 12.5.4-011 Version: 12.0.5-011 Version: 14.0.3-014 Version: 12.5.5-004 Version: 12.5.5-005 Version: 12.5.5-008 Version: 14.0.4-005 Version: 14.5.1-008 Version: 14.5.1-016 Version: 15.0.0-355 Version: 15.0.0-322 Version: 12.5.6-008 Version: 15.1.0-287 Version: 14.5.2-011 Version: 15.2.0-116 Version: 14.0.5-007 Version: 15.2.0-164 Version: 14.5.1-510 Version: 12.0.2-012 Version: 12.0.2-004 Version: 14.5.1-607 Version: 14.5.3-033 Version: 14.5.0-673 Version: 14.5.0-537 Version: 12.0.1-334 Version: 14.0.1-503 Version: 14.0.1-053 Version: 11.8.0-429 Version: 14.0.1-040 Version: 14.0.1-014 Version: 12.5.1-043 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20183", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T17:00:32.365680Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T17:00:50.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-453" }, { "status": "affected", "version": "12.5.3-002" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.0.3-005" }, { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "12.0.4-002" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "11.8.4-004" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.2-011" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.4-011" }, { "status": "affected", "version": "12.0.5-011" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.5-005" }, { "status": "affected", "version": "12.5.5-008" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "12.0.2-012" }, { "status": "affected", "version": "12.0.2-004" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" }, { "status": "affected", "version": "14.5.0-673" }, { "status": "affected", "version": "14.5.0-537" }, { "status": "affected", "version": "12.0.1-334" }, { "status": "affected", "version": "14.0.1-503" }, { "status": "affected", "version": "14.0.1-053" }, { "status": "affected", "version": "11.8.0-429" }, { "status": "affected", "version": "14.0.1-040" }, { "status": "affected", "version": "14.0.1-014" }, { "status": "affected", "version": "12.5.1-043" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.\u0026nbsp;\r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:21.787Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-swa-range-bypass-2BsEHYSu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu" } ], "source": { "advisory": "cisco-sa-swa-range-bypass-2BsEHYSu", "defects": [ "CSCwk58287" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Web Appliance Range Request Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20183", "datePublished": "2025-02-05T16:14:21.787Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-02-05T17:00:50.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1461 (GCVE-0-2016-1461)
Vulnerability from cvelistv5
Published
2016-08-01 01:00
Modified
2024-08-05 22:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "92155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "92155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "92155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036470" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1461", "datePublished": "2016-08-01T01:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15460 (GCVE-0-2018-15460)
Vulnerability from cvelistv5
Published
2019-01-10 22:00
Modified
2024-11-19 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:54:03.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106507", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15460", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:25:38.880008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:18:15.792Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-11T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "106507", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "source": { "advisory": "cisco-sa-20190109-esa-url-dos", "defect": [ [ "CSCvm81627" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-09T16:00:00-0800", "ID": "CVE-2018-15460", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "106507", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ] }, "source": { "advisory": "cisco-sa-20190109-esa-url-dos", "defect": [ [ "CSCvm81627" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-15460", "datePublished": "2019-01-10T22:00:00Z", "dateReserved": "2018-08-17T00:00:00", "dateUpdated": "2024-11-19T19:18:15.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12215 (GCVE-0-2017-12215)
Vulnerability from cvelistv5
Published
2017-09-21 05:00
Modified
2024-08-05 18:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100920", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039414" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-22T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "100920", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039414" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "100920", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100920" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039414" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12215", "datePublished": "2017-09-21T05:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:28:16.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20868 (GCVE-0-2022-20868)
Vulnerability from cvelistv5
Published
2022-11-03 19:29
Modified
2024-08-03 02:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Summary
A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability.
This vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Web Appliance |
Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 14.5.0-498 Version: 14.0.2-012 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:50.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.2-012" } ] }, { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability. \r\n\r\nThis vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.\r\n" } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "Use of Hard-coded Cryptographic Key", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:11.853Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "source": { "advisory": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "defects": [ "CSCwc12181", "CSCwc12183", "CSCwc12184" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20868", "datePublished": "2022-11-03T19:29:31.722Z", "dateReserved": "2021-11-02T13:28:29.182Z", "dateUpdated": "2024-08-03T02:24:50.239Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20257 (GCVE-0-2024-20257)
Vulnerability from cvelistv5
Published
2024-05-15 17:58
Modified
2024-08-01 21:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20257", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T16:02:05.959708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:16.569Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:58:59.579Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwf73258" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20257", "datePublished": "2024-05-15T17:58:59.579Z", "dateReserved": "2023-11-08T15:08:07.623Z", "dateUpdated": "2024-08-01T21:52:31.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-0095 (GCVE-0-2018-0095)
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Email Security and Content Security Management Appliance |
Version: Cisco Email Security and Content Security Management Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102729" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0095", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T19:09:11.902440Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:44:20.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security and Content Security Management Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security and Content Security Management Appliance" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1040221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102729" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security and Content Security Management Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security and Content Security Management Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "1040221", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102729" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0095", "datePublished": "2018-01-18T06:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T21:44:20.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1359 (GCVE-0-2021-1359)
Vulnerability from cvelistv5
Published
2021-07-08 18:35
Modified
2024-11-07 22:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:16.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:41:27.526029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:07:24.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-112", "description": "CWE-112", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-08T18:35:10", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "source": { "advisory": "cisco-sa-scr-web-priv-esc-k3HCGJZ", "defect": [ [ "CSCvv81569" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-07-07T16:00:00", "ID": "CVE-2021-1359", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-112" } ] } ] }, "references": { "reference_data": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ] }, "source": { "advisory": "cisco-sa-scr-web-priv-esc-k3HCGJZ", "defect": [ [ "CSCvv81569" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1359", "datePublished": "2021-07-08T18:35:10.824368Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:07:24.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20942 (GCVE-0-2022-20942)
Vulnerability from cvelistv5
Published
2022-11-03 19:30
Modified
2024-08-03 02:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-359 - Exposure of Private Personal Information to an Unauthorized Actor
Summary
A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.
This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" } ] }, { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.0-115" }, { "status": "affected", "version": "11.0.1-161" }, { "status": "affected", "version": "11.5.1-105" }, { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.\r\n\r This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:18.446Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "source": { "advisory": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "defects": [ "CSCwc43106", "CSCwc43102", "CSCwc43104" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20942", "datePublished": "2022-11-03T19:30:36.424Z", "dateReserved": "2021-11-02T13:28:29.193Z", "dateUpdated": "2024-08-03T02:31:59.271Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20184 (GCVE-0-2025-20184)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.
This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 13.5.1-277 Version: 13.0.0-392 Version: 14.2.0-620 Version: 13.0.5-007 Version: 13.5.4-038 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 Version: 15.5.2-018 Version: 15.0.3-002 Version: 15.5.3-022 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20184", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:59:57.945223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T17:00:15.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" }, { "status": "affected", "version": "15.5.2-018" }, { "status": "affected", "version": "15.0.3-002" }, { "status": "affected", "version": "15.5.3-022" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-453" }, { "status": "affected", "version": "12.5.3-002" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.0.3-005" }, { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "12.0.4-002" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "11.8.4-004" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.2-011" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.4-011" }, { "status": "affected", "version": "12.0.5-011" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.5-005" }, { "status": "affected", "version": "12.5.5-008" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "12.0.2-012" }, { "status": "affected", "version": "12.0.2-004" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" }, { "status": "affected", "version": "15.0.1-004" }, { "status": "affected", "version": "15.2.1-011" }, { "status": "affected", "version": "14.5.0-673" }, { "status": "affected", "version": "14.5.0-537" }, { "status": "affected", "version": "12.0.1-334" }, { "status": "affected", "version": "14.0.1-503" }, { "status": "affected", "version": "14.0.1-053" }, { "status": "affected", "version": "11.8.0-429" }, { "status": "affected", "version": "14.0.1-040" }, { "status": "affected", "version": "14.0.1-014" }, { "status": "affected", "version": "12.5.1-043" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:30.863Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-multi-yKUJhS34", "defects": [ "CSCwk70559" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager and Secure Web Appliance Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20184", "datePublished": "2025-02-05T16:14:30.863Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-02-05T17:00:15.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0577 (GCVE-0-2015-0577)
Vulnerability from cvelistv5
Published
2015-01-14 19:00
Modified
2024-08-06 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:31.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "62289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62289", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72056" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0577", "datePublished": "2015-01-14T19:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:31.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20781 (GCVE-0-2022-20781)
Vulnerability from cvelistv5
Published
2022-04-06 18:12
Modified
2024-11-06 16:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:49.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20781", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:09.310855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:29:07.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:12:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "source": { "advisory": "cisco-sa-wsa-stored-xss-XPsJghMY", "defect": [ [ "CSCvz13599" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20781", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ] }, "source": { "advisory": "cisco-sa-wsa-stored-xss-XPsJghMY", "defect": [ [ "CSCvz13599" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20781", "datePublished": "2022-04-06T18:12:02.401789Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:29:07.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20867 (GCVE-0-2022-20867)
Vulnerability from cvelistv5
Published
2022-11-03 19:28
Modified
2024-11-20 14:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account.
This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 13.0.0-392 Version: 13.5.1-277 Version: 12.5.0-066 Version: 14.0.0-698 Version: 14.2.0-620 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:50.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20867", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-29T20:30:59.948121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T14:32:35.941Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account. \r\n\r This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.\r\n" } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:11.549Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "source": { "advisory": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "defects": [ "CSCwc12185", "CSCwc12186" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20867", "datePublished": "2022-11-03T19:28:53.428Z", "dateReserved": "2021-11-02T13:28:29.182Z", "dateUpdated": "2024-11-20T14:32:35.941Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20256 (GCVE-0-2024-20256)
Vulnerability from cvelistv5
Published
2024-05-15 17:56
Modified
2024-08-15 15:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 12.5.6-008 Version: 14.5.0-498 Version: 14.5.1-016 Version: 14.0.3-014 Version: 14.0.2-012 Version: 14.0.4-005 Version: 15.0.0-322 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-20256", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-15T18:47:15.332751Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T15:29:20.282Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "12.5.6-008" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "15.0.0-322" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.0.0-087" }, { "status": "affected", "version": "11.0.0-115" }, { "status": "affected", "version": "11.0.1-161" }, { "status": "affected", "version": "11.5.1-105" }, { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\rThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:56:38.074Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwe88788", "CSCwe91887" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20256", "datePublished": "2024-05-15T17:56:38.074Z", "dateReserved": "2023-11-08T15:08:07.623Z", "dateUpdated": "2024-08-15T15:29:20.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1534 (GCVE-0-2021-1534)
Vulnerability from cvelistv5
Published
2021-10-06 19:35
Modified
2024-11-07 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1534", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:47:22.320751Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:51:16.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T19:35:10", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-sGcfsDrp", "defect": [ [ "CSCvx60178" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-1534", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-sGcfsDrp", "defect": [ [ "CSCvx60178" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1534", "datePublished": "2021-10-06T19:35:10.150936Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T21:51:16.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12303 (GCVE-0-2017-12303)
Vulnerability from cvelistv5
Published
2017-11-16 07:00
Modified
2024-08-05 18:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Web Security Appliance |
Version: Cisco Web Security Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:55.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039828", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101932" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Web Security Appliance" } ] } ], "datePublic": "2017-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1039828", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101932" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Web Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "1039828", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039828" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101932" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12303", "datePublished": "2017-11-16T07:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:55.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20057 (GCVE-0-2023-20057)
Vulnerability from cvelistv5
Published
2023-01-19 01:32
Modified
2024-08-02 08:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-792 - Incomplete Filtering of One or More Instances of Special Elements
Summary
A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.
This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-url-bypass-WbMQqNJh", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "unaffected", "version": "10.0.1-087" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.\r\n\r This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-792", "description": "Incomplete Filtering of One or More Instances of Special Elements", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-url-bypass-WbMQqNJh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-WbMQqNJh", "defects": [ "CSCwb58117" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20057", "datePublished": "2023-01-19T01:32:32.802Z", "dateReserved": "2022-10-27T18:47:50.320Z", "dateUpdated": "2024-08-02T08:57:35.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1886 (GCVE-0-2019-1886)
Vulnerability from cvelistv5
Published
2019-07-04 19:50
Modified
2024-11-19 19:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < 10.5.5-005 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109049" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1886", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:48.968119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:49.939Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "10.5.5-005", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-05T09:06:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109049" } ], "source": { "advisory": "cisco-sa-20190703-wsa-dos", "defect": [ [ "CSCvo33747" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1886", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "10.5.5-005" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109049" } ] }, "source": { "advisory": "cisco-sa-20190703-wsa-dos", "defect": [ [ "CSCvo33747" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1886", "datePublished": "2019-07-04T19:50:10.367933Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:49.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3368 (GCVE-0-2020-3368)
Vulnerability from cvelistv5
Published
2020-06-18 02:17
Modified
2024-11-15 17:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3368", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:21:08.491590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:00:26.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:17:22", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-WO4BZ75s", "defect": [ [ "CSCvs66918" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3368", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-WO4BZ75s", "defect": [ [ "CSCvs66918" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3368", "datePublished": "2020-06-18T02:17:22.405008Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:00:26.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20429 (GCVE-0-2024-20429)
Vulnerability from cvelistv5
Published
2024-07-17 16:29
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.
This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-131 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email", "vendor": "cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20429", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T03:55:39.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-17T16:29:18.884Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "source": { "advisory": "cisco-sa-esa-priv-esc-ssti-xNO2EOGZ", "defects": [ "CSCwf61949" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20429", "datePublished": "2024-07-17T16:29:18.884Z", "dateReserved": "2023-11-08T15:08:07.666Z", "dateUpdated": "2024-08-01T21:59:41.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20952 (GCVE-0-2022-20952)
Vulnerability from cvelistv5
Published
2023-02-16 15:27
Modified
2024-08-03 02:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.
This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Web Appliance |
Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 14.5.0-498 Version: 14.0.3-014 Version: 14.0.2-012 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-wsa-bypass-bwBfugek", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:24.396Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-wsa-bypass-bwBfugek", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "source": { "advisory": "cisco-sa-wsa-bypass-bwBfugek", "defects": [ "CSCwc54898" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20952", "datePublished": "2023-02-16T15:27:16.003Z", "dateReserved": "2021-11-02T13:28:29.194Z", "dateUpdated": "2024-08-03T02:31:59.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3381 (GCVE-0-2014-3381)
Vulnerability from cvelistv5
Published
2014-10-19 01:00
Modified
2024-08-06 10:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:05.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-19T01:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-3381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-3381", "datePublished": "2014-10-19T01:00:00", "dateReserved": "2014-05-07T00:00:00", "dateUpdated": "2024-08-06T10:43:05.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20871 (GCVE-0-2022-20871)
Vulnerability from cvelistv5
Published
2024-11-15 15:27
Modified
2024-11-15 15:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Web Appliance |
Version: 12.5.3-002 Version: 14.1.0-032 Version: 14.1.0-047 Version: 14.1.0-041 Version: 14.0.2-012 Version: 12.5.1-011 Version: 12.5.2-007 Version: 12.5.2-011 Version: 14.5.0-498 Version: 12.5.4-005 Version: 12.5.4-011 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-20871", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:35:06.319558Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:35:23.825Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5.3-002" }, { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.2-011" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.4-011" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco\u0026nbsp;AsyncOS for Cisco\u0026nbsp;Secure Web Appliance, formerly Cisco\u0026nbsp;Web Security Appliance (WSA),\u0026nbsp;could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see ." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:27:14.028Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-wsa-prv-esc-8PdRU8t8", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv" } ], "source": { "advisory": "cisco-sa-wsa-prv-esc-8PdRU8t8", "defects": [ "CSCwb92675" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20871", "datePublished": "2024-11-15T15:27:14.028Z", "dateReserved": "2021-11-02T13:28:29.183Z", "dateUpdated": "2024-11-15T15:35:23.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12218 (GCVE-0-2017-12218)
Vulnerability from cvelistv5
Published
2017-09-07 21:00
Modified
2024-08-05 18:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-12T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039288" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12218", "datePublished": "2017-09-07T21:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:28:16.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-15956 (GCVE-0-2019-15956)
Vulnerability from cvelistv5
Published
2019-11-26 03:11
Modified
2024-11-20 17:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15956", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:50:39.139194Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:04:44.749Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-26T03:11:43", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "source": { "advisory": "cisco-sa-20191106-wsa-unauth-devreset", "defect": [ [ "CSCvp51493" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-11-06T16:00:00-0800", "ID": "CVE-2019-15956", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Unauthorized Device Reset Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ] }, "source": { "advisory": "cisco-sa-20191106-wsa-unauth-devreset", "defect": [ [ "CSCvp51493" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-15956", "datePublished": "2019-11-26T03:11:43.562771Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-20T17:04:44.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1947 (GCVE-0-2019-1947)
Vulnerability from cvelistv5
Published
2020-09-23 00:26
Modified
2024-11-13 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:51.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1947", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:00.894393Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:05:34.136Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T00:26:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "source": { "advisory": "cisco-sa-20200219-esa-dos", "defect": [ [ "CSCvq03793" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-19T16:00:00", "ID": "CVE-2019-1947", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ] }, "source": { "advisory": "cisco-sa-20200219-esa-dos", "defect": [ [ "CSCvq03793" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1947", "datePublished": "2020-09-23T00:26:01.117272Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-13T18:05:34.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20504 (GCVE-0-2024-20504)
Vulnerability from cvelistv5
Published
2024-11-06 16:29
Modified
2024-11-06 17:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20504", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T17:05:32.372312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T17:05:40.097Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" }, { "status": "affected", "version": "15.5.1-024" }, { "status": "affected", "version": "15.5.1-029" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.1.0-032" }, { "status": "affected", "version": "14.1.0-047" }, { "status": "affected", "version": "14.1.0-041" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.4-005" }, { "status": "affected", "version": "14.5.1-008" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "15.0.0-355" }, { "status": "affected", "version": "15.0.0-322" }, { "status": "affected", "version": "15.1.0-287" }, { "status": "affected", "version": "14.5.2-011" }, { "status": "affected", "version": "15.2.0-116" }, { "status": "affected", "version": "14.0.5-007" }, { "status": "affected", "version": "15.2.0-164" }, { "status": "affected", "version": "14.5.1-510" }, { "status": "affected", "version": "14.5.1-607" }, { "status": "affected", "version": "14.5.3-033" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:29:37.791Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-wsa-sma-xss-zYm3f49n", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n" } ], "source": { "advisory": "cisco-sa-esa-wsa-sma-xss-zYm3f49n", "defects": [ "CSCwj72814" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20504", "datePublished": "2024-11-06T16:29:37.791Z", "dateReserved": "2023-11-08T15:08:07.687Z", "dateUpdated": "2024-11-06T17:05:40.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3547 (GCVE-0-2020-3547)
Vulnerability from cvelistv5
Published
2020-09-04 02:26
Modified
2024-11-13 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:54.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3547", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:24:05.025975Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:07:07.622Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T02:26:23", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "source": { "advisory": "cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP", "defect": [ [ "CSCvt98774", "CSCvu03264", "CSCvu08049" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-02T16:00:00", "ID": "CVE-2020-3547", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ] }, "source": { "advisory": "cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP", "defect": [ [ "CSCvt98774", "CSCvu03264", "CSCvu08049" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3547", "datePublished": "2020-09-04T02:26:23.754677Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:07:07.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3568 (GCVE-0-2020-3568)
Vulnerability from cvelistv5
Published
2020-10-08 04:20
Modified
2024-11-13 17:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:55.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3568", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:12:34.051182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:52:26.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T04:20:43", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-zZtugtg3", "defect": [ [ "CSCvu50941", "CSCvu53078" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-10-07T16:00:00", "ID": "CVE-2020-3568", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-zZtugtg3", "defect": [ [ "CSCvu50941", "CSCvu53078" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3568", "datePublished": "2020-10-08T04:20:43.311961Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:52:26.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20383 (GCVE-0-2024-20383)
Vulnerability from cvelistv5
Published
2024-05-15 17:59
Modified
2025-08-08 12:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email and Web Manager |
Version: 13.6.2-078 Version: 13.0.0-277 Version: 13.8.1-068 Version: 13.8.1-074 Version: 14.0.0-404 Version: 12.8.1-002 Version: 14.1.0-227 Version: 14.2.0-212 Version: 12.8.1-021 Version: 13.8.1-108 Version: 14.2.0-224 Version: 14.3.0-120 Version: 15.0.0-334 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T18:50:56.053580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:43.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T12:36:42.359Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-bgG5WHOD", "defects": [ "CSCwi59618" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Email and Web Manager Stored Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20383", "datePublished": "2024-05-15T17:59:49.921Z", "dateReserved": "2023-11-08T15:08:07.658Z", "dateUpdated": "2025-08-08T12:36:42.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20180 (GCVE-0-2025-20180)
Vulnerability from cvelistv5
Published
2025-02-05 16:14
Modified
2025-02-05 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Secure Email |
Version: 14.0.0-698 Version: 13.5.1-277 Version: 13.0.0-392 Version: 14.2.0-620 Version: 13.0.5-007 Version: 13.5.4-038 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 Version: 15.5.1-055 Version: 15.5.2-018 Version: 16.0.0-050 Version: 15.0.3-002 Version: 16.0.0-054 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T17:20:31.169165Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T17:20:45.616Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" }, { "status": "affected", "version": "15.5.1-055" }, { "status": "affected", "version": "15.5.2-018" }, { "status": "affected", "version": "16.0.0-050" }, { "status": "affected", "version": "15.0.3-002" }, { "status": "affected", "version": "16.0.0-054" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.6.2-023" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.0.0-249" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.8.1-052" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "13.6.1-201" }, { "status": "affected", "version": "14.2.0-203" }, { "status": "affected", "version": "14.2.0-212" }, { "status": "affected", "version": "12.8.1-021" }, { "status": "affected", "version": "13.8.1-108" }, { "status": "affected", "version": "14.2.0-224" }, { "status": "affected", "version": "14.3.0-120" }, { "status": "affected", "version": "15.0.0-334" }, { "status": "affected", "version": "15.5.1-024" }, { "status": "affected", "version": "15.5.1-029" }, { "status": "affected", "version": "15.5.2-005" }, { "status": "affected", "version": "16.0.0-195" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:14:11.746Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-xss-WCk2WcuG", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG" } ], "source": { "advisory": "cisco-sa-esa-sma-xss-WCk2WcuG", "defects": [ "CSCwn25954" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20180", "datePublished": "2025-02-05T16:14:11.746Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-02-05T17:20:45.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-26082 (GCVE-0-2020-26082)
Vulnerability from cvelistv5
Published
2023-08-04 20:49
Modified
2025-07-09 13:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.
The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: N/A |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:06.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-zip-bypass-gbU4gtTg", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-26082", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-09T13:37:36.322682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-09T13:37:52.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.\r\n The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:04.488Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-zip-bypass-gbU4gtTg", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "source": { "advisory": "cisco-sa-esa-zip-bypass-gbU4gtTg", "defects": [ "CSCvv38679" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26082", "datePublished": "2023-08-04T20:49:05.202Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2025-07-09T13:37:52.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0605 (GCVE-0-2015-0605)
Vulnerability from cvelistv5
Published
2015-02-07 02:00
Modified
2024-08-06 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "72528", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "72528", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "72528", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0605", "datePublished": "2015-02-07T02:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1516 (GCVE-0-2021-1516)
Vulnerability from cvelistv5
Published
2021-05-06 12:51
Modified
2024-11-08 23:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:43:31.537269Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:16:39.585Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-540", "description": "CWE-540", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:51:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "source": { "advisory": "cisco-sa-esa-wsa-sma-info-gY2AEz2H", "defect": [ [ "CSCvv98333", "CSCvv98363", "CSCvv98379", "CSCvv98401", "CSCvv98422", "CSCvv98448", "CSCvv99117", "CSCvv99534", "CSCvw03419", "CSCvw03505", "CSCvw04276", "CSCvw35465", "CSCvw36748" ] ], "discovery": "INTERNAL" }, "title": "Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1516", "STATE": "PUBLIC", "TITLE": "Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-540" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ] }, "source": { "advisory": "cisco-sa-esa-wsa-sma-info-gY2AEz2H", "defect": [ [ "CSCvv98333", "CSCvv98363", "CSCvv98379", "CSCvv98401", "CSCvv98422", "CSCvv98448", "CSCvv99117", "CSCvv99534", "CSCvw03419", "CSCvw03505", "CSCvw04276", "CSCvw35465", "CSCvw36748" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1516", "datePublished": "2021-05-06T12:51:08.085833Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:16:39.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20653 (GCVE-0-2022-20653)
Vulnerability from cvelistv5
Published
2022-02-17 15:00
Modified
2024-11-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:17:52.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20653", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T16:01:54.863072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:30:09.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-17T15:00:34", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "source": { "advisory": "cisco-sa-esa-dos-MxZvGtgU", "defect": [ [ "CSCvy63674" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-02-17T00:00:00", "ID": "CVE-2022-20653", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ] }, "source": { "advisory": "cisco-sa-esa-dos-MxZvGtgU", "defect": [ [ "CSCvy63674" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20653", "datePublished": "2022-02-17T15:00:34.138914Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:30:09.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12353 (GCVE-0-2017-12353)
Vulnerability from cvelistv5
Published
2017-11-30 09:00
Modified
2024-08-05 18:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039917", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-254", "description": "CWE-254", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-01T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1039917", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102002" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12353", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-254" } ] } ] }, "references": { "reference_data": [ { "name": "1039917", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039917" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102002" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12353", "datePublished": "2017-11-30T09:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:56.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1884 (GCVE-0-2019-1884)
Vulnerability from cvelistv5
Published
2019-07-04 19:50
Modified
2024-11-21 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < 10.5.5-005 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1884", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:57:58.500412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:20:16.823Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "10.5.5-005", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-04T19:50:14", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "source": { "advisory": "cisco-sa-20190703-asyncos-wsa", "defect": [ [ "CSCvo29853" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1884", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "10.5.5-005" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ] }, "source": { "advisory": "cisco-sa-20190703-asyncos-wsa", "defect": [ [ "CSCvo29853" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1884", "datePublished": "2019-07-04T19:50:14.713033Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:20:16.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1566 (GCVE-0-2021-1566)
Vulnerability from cvelistv5
Published
2021-06-16 17:45
Modified
2024-11-07 22:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:43:43.312770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:08:10.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-296", "description": "CWE-296", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T17:45:41", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "source": { "advisory": "cisco-sa-esa-wsa-cert-vali-n8L97RW", "defect": [ [ "CSCvw08342", "CSCvw08378" ] ], "discovery": "INTERNAL" }, "title": "Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-06-16T16:00:00", "ID": "CVE-2021-1566", "STATE": "PUBLIC", "TITLE": "Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.4", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-296" } ] } ] }, "references": { "reference_data": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ] }, "source": { "advisory": "cisco-sa-esa-wsa-cert-vali-n8L97RW", "defect": [ [ "CSCvw08342", "CSCvw08378" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1566", "datePublished": "2021-06-16T17:45:41.215864Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:08:10.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20392 (GCVE-0-2024-20392)
Vulnerability from cvelistv5
Published
2024-05-15 17:22
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-113 - Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Summary
A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack.
This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: 11.0.3-238 Version: 11.1.0-069 Version: 11.1.0-128 Version: 12.0.0-419 Version: 12.1.0-071 Version: 12.1.0-087 Version: 12.1.0-089 Version: 13.0.0-392 Version: 13.0.5-007 Version: 13.5.1-277 Version: 13.5.4-038 Version: 12.5.0-066 Version: 12.5.4-041 Version: 12.5.3-041 Version: 14.0.0-698 Version: 14.2.0-620 Version: 14.2.1-020 Version: 14.3.0-032 Version: 15.0.0-104 Version: 15.0.1-030 Version: 15.5.0-048 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20392", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-15T19:20:56.899213Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:31.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-http-split-GLrnnOwS", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.0.5-007" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "13.5.4-038" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "12.5.4-041" }, { "status": "affected", "version": "12.5.3-041" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" }, { "status": "affected", "version": "14.2.1-020" }, { "status": "affected", "version": "14.3.0-032" }, { "status": "affected", "version": "15.0.0-104" }, { "status": "affected", "version": "15.0.1-030" }, { "status": "affected", "version": "15.5.0-048" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management API of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. \r\n\r This vulnerability is due to insufficient input validation of some parameters that are passed to the web-based management API of the affected system. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to perform cross-site scripting (XSS) attacks, resulting in the execution of arbitrary script code in the browser of the targeted user, or could allow the attacker to access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-113", "description": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Response Splitting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:22:39.980Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-http-split-GLrnnOwS", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS" } ], "source": { "advisory": "cisco-sa-esa-http-split-GLrnnOwS", "defects": [ "CSCwh12975" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20392", "datePublished": "2024-05-15T17:22:39.980Z", "dateReserved": "2023-11-08T15:08:07.659Z", "dateUpdated": "2024-08-01T21:59:42.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }