Lucene search

K
ciscoCiscoCISCO-SA-20170607-ESA1
HistoryJun 07, 2017 - 4:00 p.m.

Cisco Email Security Appliance Attachment Filter Bypass Vulnerability

2017-06-0716:00:00
tools.cisco.com
12

EPSS

0.002

Percentile

52.7%

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device.

The vulnerability is due to improper input validation of an email with an attachment and modified Multipurpose Internet Mail Extensions (MIME) header. An attacker could exploit this vulnerability by sending a malformed email message with an attachment. A successful exploit could allow the attacker to bypass configured message filters to drop the email. The email may not be RFC compliant. However, some mail clients could still allow users to read the email, which may not have been properly filtered by the device.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esa1 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esa1”]

Affected configurations

Vulners
Node
ciscoemail_security_applianceMatchany
OR
ciscoemail_security_applianceMatchany
VendorProductVersionCPE
ciscoemail_security_applianceanycpe:2.3:h:cisco:email_security_appliance:any:*:*:*:*:*:*:*

EPSS

0.002

Percentile

52.7%

Related for CISCO-SA-20170607-ESA1