Lucene search

K
ciscoCiscoCISCO-SA-20150206-CVE-2015-0605
HistoryFeb 06, 2015 - 9:45 p.m.

Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability

2015-02-0621:45:10
tools.cisco.com
20

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

75.3%

A vulnerability in the uuencode inspection engine of Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass engine protection and deliver a malicious file as an email attachment.

The vulnerability is due to improper implementation of the logic for decoding uuencoded content. An attacker could exploit this vulnerability sending a crafted uuencoded email message that contains a malicious attachment.

Cisco has confirmed the vulnerability in a security notice and released software updates.

Successful exploitation could allow the attacker to evade email filtering and deliver malicious content to a targeted user, which could be used to conduct further attacks. Administrators are advised to implement effective mitigations.

Affected configurations

Vulners
Node
ciscoemail_security_applianceMatchany
OR
ciscoemail_security_applianceMatchany
VendorProductVersionCPE
ciscoemail_security_applianceanycpe:2.3:h:cisco:email_security_appliance:any:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

75.3%

Related for CISCO-SA-20150206-CVE-2015-0605