Lucene search

K
ciscoCiscoCISCO-SA-ESA-DOS-MXZVGTGU
HistoryFeb 16, 2022 - 4:00 p.m.

Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability

2022-02-1616:00:00
tools.cisco.com
60
cisco
email security
dns verification
denial of service
vulnerability
cisco asyncos
software
cisco esa
remote attacker
error handling
management interfaces
software updates
workarounds

EPSS

0.001

Percentile

49.5%

A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU”]

Affected configurations

Vulners
Node
ciscoemail_security_applianceMatchany
OR
ciscoemail_security_applianceMatchany
VendorProductVersionCPE
ciscoemail_security_applianceanycpe:2.3:h:cisco:email_security_appliance:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

49.5%

Related for CISCO-SA-ESA-DOS-MXZVGTGU