All the vulnerabilites related to cisco - asyncos
cve-2022-20942
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" } ] }, { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.3-238" }, { "status": "affected", "version": "11.1.0-069" }, { "status": "affected", "version": "11.1.0-131" }, { "status": "affected", "version": "11.1.0-128" }, { "status": "affected", "version": "12.0.0-419" }, { "status": "affected", "version": "12.1.0-071" }, { "status": "affected", "version": "12.1.0-087" }, { "status": "affected", "version": "12.1.0-089" }, { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0.0-115" }, { "status": "affected", "version": "11.0.1-161" }, { "status": "affected", "version": "11.5.1-105" }, { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" }, { "status": "affected", "version": "14.2.0-212" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.\r\n\r This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:18.446Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "source": { "advisory": "cisco-sa-cnt-sec-infodiscl-BVKKnUG", "defects": [ "CSCwc43106", "CSCwc43102", "CSCwc43104" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20942", "datePublished": "2022-11-03T19:30:36.424Z", "dateReserved": "2021-11-02T13:28:29.193Z", "dateUpdated": "2024-08-03T02:31:59.271Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12353
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039917 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102002 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039917", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-254", "description": "CWE-254", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-01T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1039917", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102002" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12353", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-254" } ] } ] }, "references": { "reference_data": [ { "name": "1039917", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039917" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "name": "102002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102002" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12353", "datePublished": "2017-11-30T09:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:56.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0095
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1040221 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1040222 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/102729 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Email Security and Content Security Management Appliance |
Version: Cisco Email Security and Content Security Management Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040221", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102729" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0095", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T19:09:11.902440Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:44:20.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security and Content Security Management Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security and Content Security Management Appliance" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1040221", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102729" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security and Content Security Management Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security and Content Security Management Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "1040221", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040221" }, { "name": "1040222", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040222" }, { "name": "102729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102729" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0095", "datePublished": "2018-01-18T06:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T21:44:20.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26082
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Secure Email |
Version: N/A |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:06.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-zip-bypass-gbU4gtTg", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.\r\n The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:04.488Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-zip-bypass-gbU4gtTg", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "source": { "advisory": "cisco-sa-esa-zip-bypass-gbU4gtTg", "defects": [ "CSCvv38679" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26082", "datePublished": "2023-08-04T20:49:05.202Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-08-04T15:49:06.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2195
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1030258 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-16T13:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140519 Cisco AsyncOS Software Administration Role Authorization Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "name": "1030258", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030258" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2195", "datePublished": "2014-05-20T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20215
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 14.5.0-498 Version: 14.5.1-016 Version: 14.0.3-014 Version: 14.0.2-012 Version: 14.0.4-005 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-wsa-bypass-vXvqwzsj", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.7.0-406" }, { "status": "affected", "version": "11.7.0-418" }, { "status": "affected", "version": "11.7.1-049" }, { "status": "affected", "version": "11.7.1-006" }, { "status": "affected", "version": "11.7.1-020" }, { "status": "affected", "version": "11.7.2-011" }, { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.5.1-016" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" }, { "status": "affected", "version": "14.0.4-005" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-202", "description": "Exposure of Sensitive Information Through Data Queries", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:20.215Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-wsa-bypass-vXvqwzsj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "source": { "advisory": "cisco-sa-wsa-bypass-vXvqwzsj", "defects": [ "CSCwf60901", "CSCwf55917", "CSCwf94501" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20215", "datePublished": "2023-08-03T21:16:38.159Z", "dateReserved": "2022-10-27T18:47:50.368Z", "dateUpdated": "2024-08-02T09:05:35.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1534
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1534", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:47:22.320751Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:51:16.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T19:35:10", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-sGcfsDrp", "defect": [ [ "CSCvx60178" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-1534", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-sGcfsDrp", "defect": [ [ "CSCvx60178" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1534", "datePublished": "2021-10-06T19:35:10.150936Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T21:51:16.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1983
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1983", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:03.559721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:05:42.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T00:25:56", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "source": { "advisory": "cisco-sa-20200219-esa-sma-dos", "defect": [ [ "CSCvo89182", "CSCvo89192" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-19T16:00:00", "ID": "CVE-2019-1983", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200219 Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ] }, "source": { "advisory": "cisco-sa-20200219-esa-sma-dos", "defect": [ [ "CSCvo89182", "CSCvo89192" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1983", "datePublished": "2020-09-23T00:25:56.648526Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-13T18:05:42.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-34741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34741", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:44:16.445690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:44:52.277Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-04T15:40:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "source": { "advisory": "cisco-sa-esa-dos-JOm9ETfO", "defect": [ [ "CSCvy59938" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-11-03T16:00:00", "ID": "CVE-2021-34741", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "20211103 Cisco Email Security Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ] }, "source": { "advisory": "cisco-sa-esa-dos-JOm9ETfO", "defect": [ [ "CSCvy59938" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34741", "datePublished": "2021-11-04T15:40:17.777881Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:44:52.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0577
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62289 | third-party-advisory, x_refsource_SECUNIA | |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577 | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100556 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id/1031544 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/72056 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:31.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "62289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62289", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62289" }, { "name": "20150113 Cisco AsyncOS ISQ XSS Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "name": "cisco-asyncos-cve20150577-xss(100556)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "name": "1031544", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031544" }, { "name": "72056", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72056" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0577", "datePublished": "2015-01-14T19:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:31.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12218
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100681 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1039288 | vdb-entry, x_refsource_SECTRACK |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-12T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "name": "100681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100681" }, { "name": "1039288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039288" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12218", "datePublished": "2017-09-07T21:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:28:16.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15956
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15956", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:50:39.139194Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:04:44.749Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-26T03:11:43", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "source": { "advisory": "cisco-sa-20191106-wsa-unauth-devreset", "defect": [ [ "CSCvp51493" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-11-06T16:00:00-0800", "ID": "CVE-2019-15956", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Unauthorized Device Reset Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20191106 Cisco Web Security Appliance Unauthorized Device Reset Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ] }, "source": { "advisory": "cisco-sa-20191106-wsa-unauth-devreset", "defect": [ [ "CSCvp51493" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-15956", "datePublished": "2019-11-26T03:11:43.562771Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-20T17:04:44.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1947
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:51.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1947", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:00.894393Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:05:34.136Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T00:26:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "source": { "advisory": "cisco-sa-20200219-esa-dos", "defect": [ [ "CSCvq03793" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-19T16:00:00", "ID": "CVE-2019-1947", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200219 Cisco Email Security Appliance Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ] }, "source": { "advisory": "cisco-sa-20200219-esa-dos", "defect": [ [ "CSCvq03793" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1947", "datePublished": "2020-09-23T00:26:01.117272Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-13T18:05:34.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20781
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:49.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20781", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:09.310855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:29:07.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:12:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "source": { "advisory": "cisco-sa-wsa-stored-xss-XPsJghMY", "defect": [ [ "CSCvz13599" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20781", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ] }, "source": { "advisory": "cisco-sa-wsa-stored-xss-XPsJghMY", "defect": [ [ "CSCvz13599" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20781", "datePublished": "2022-04-06T18:12:02.401789Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:29:07.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20868
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Secure Web Appliance |
Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 14.5.0-498 Version: 14.0.2-012 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:50.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.2-012" } ] }, { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.0.0-452" }, { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability. \r\n\r\nThis vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.\r\n" } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "Use of Hard-coded Cryptographic Key", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:11.853Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "source": { "advisory": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "defects": [ "CSCwc12181", "CSCwc12183", "CSCwc12184" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20868", "datePublished": "2022-11-03T19:29:31.722Z", "dateReserved": "2021-11-02T13:28:29.182Z", "dateUpdated": "2024-08-03T02:24:50.239Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20057
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) | |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-url-bypass-WbMQqNJh", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "unaffected", "version": "10.0.1-087" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.\r\n\r This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-792", "description": "Incomplete Filtering of One or More Instances of Special Elements", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-url-bypass-WbMQqNJh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-WbMQqNJh", "defects": [ "CSCwb58117" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20057", "datePublished": "2023-01-19T01:32:32.802Z", "dateReserved": "2022-10-27T18:47:50.320Z", "dateUpdated": "2024-08-02T08:57:35.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1438
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1036156 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036156", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-28T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1036156", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036156", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036156" }, { "name": "20160622 Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1438", "datePublished": "2016-06-23T00:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12215
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/100920 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039414 | vdb-entry, x_refsource_SECTRACK |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Email Security Appliance |
Version: Cisco Email Security Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100920", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039414" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance" } ] } ], "datePublic": "2017-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-22T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "100920", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039414" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "100920", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100920" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "name": "1039414", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039414" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12215", "datePublished": "2017-09-21T05:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:28:16.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1461
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/92155 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1036470 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "92155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "92155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "92155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92155" }, { "name": "20160727 Cisco Email Security Appliance File Type Filtering Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "name": "1036470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036470" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1461", "datePublished": "2016-08-01T01:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12303
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039828 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101932 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Web Security Appliance |
Version: Cisco Web Security Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:55.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039828", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101932" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Web Security Appliance" } ] } ], "datePublic": "2017-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1039828", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101932" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Web Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "1039828", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039828" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "name": "101932", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101932" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12303", "datePublished": "2017-11-16T07:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:55.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1516
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:43:31.537269Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:16:39.585Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-540", "description": "CWE-540", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:51:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "source": { "advisory": "cisco-sa-esa-wsa-sma-info-gY2AEz2H", "defect": [ [ "CSCvv98333", "CSCvv98363", "CSCvv98379", "CSCvv98401", "CSCvv98422", "CSCvv98448", "CSCvv99117", "CSCvv99534", "CSCvw03419", "CSCvw03505", "CSCvw04276", "CSCvw35465", "CSCvw36748" ] ], "discovery": "INTERNAL" }, "title": "Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1516", "STATE": "PUBLIC", "TITLE": "Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-540" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ] }, "source": { "advisory": "cisco-sa-esa-wsa-sma-info-gY2AEz2H", "defect": [ [ "CSCvv98333", "CSCvv98363", "CSCvv98379", "CSCvv98401", "CSCvv98422", "CSCvv98448", "CSCvv99117", "CSCvv99534", "CSCvw03419", "CSCvw03505", "CSCvw04276", "CSCvw35465", "CSCvw36748" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1516", "datePublished": "2021-05-06T12:51:08.085833Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:16:39.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20867
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Secure Email |
Version: 13.0.0-392 Version: 13.5.1-277 Version: 12.5.0-066 Version: 14.0.0-698 Version: 14.2.0-620 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:50.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20867", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-29T20:30:59.948121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T14:32:35.941Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "13.0.0-392" }, { "status": "affected", "version": "13.5.1-277" }, { "status": "affected", "version": "12.5.0-066" }, { "status": "affected", "version": "14.0.0-698" }, { "status": "affected", "version": "14.2.0-620" } ] }, { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.0.1-011" }, { "status": "affected", "version": "12.5.0-636" }, { "status": "affected", "version": "12.5.0-658" }, { "status": "affected", "version": "12.5.0-678" }, { "status": "affected", "version": "12.5.0-670" }, { "status": "affected", "version": "13.0.0-277" }, { "status": "affected", "version": "13.6.2-078" }, { "status": "affected", "version": "13.8.1-068" }, { "status": "affected", "version": "13.8.1-074" }, { "status": "affected", "version": "12.8.1-002" }, { "status": "affected", "version": "14.0.0-404" }, { "status": "affected", "version": "14.1.0-223" }, { "status": "affected", "version": "14.1.0-227" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account. \r\n\r This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.\r\n" } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:11.549Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "source": { "advisory": "cisco-sa-esasmawsa-vulns-YRuSW5mD", "defects": [ "CSCwc12185", "CSCwc12186" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20867", "datePublished": "2022-11-03T19:28:53.428Z", "dateReserved": "2021-11-02T13:28:29.182Z", "dateUpdated": "2024-11-20T14:32:35.941Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15460
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106507 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:54:03.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106507", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15460", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:25:38.880008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:18:15.792Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-11T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "106507", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "source": { "advisory": "cisco-sa-20190109-esa-url-dos", "defect": [ [ "CSCvm81627" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-09T16:00:00-0800", "ID": "CVE-2018-15460", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "106507", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106507" }, { "name": "20190109 Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ] }, "source": { "advisory": "cisco-sa-20190109-esa-url-dos", "defect": [ [ "CSCvm81627" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-15460", "datePublished": "2019-01-10T22:00:00Z", "dateReserved": "2018-08-17T00:00:00", "dateUpdated": "2024-11-19T19:18:15.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3547
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:54.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3547", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:24:05.025975Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:07:07.622Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T02:26:23", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "source": { "advisory": "cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP", "defect": [ [ "CSCvt98774", "CSCvu03264", "CSCvu08049" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-02T16:00:00", "ID": "CVE-2020-3547", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "20200902 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ] }, "source": { "advisory": "cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP", "defect": [ [ "CSCvt98774", "CSCvu03264", "CSCvu08049" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3547", "datePublished": "2020-09-04T02:26:23.754677Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:07:07.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0087
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103407 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1040464 | vdb-entry, x_refsource_SECTRACK |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Web Security Appliance |
Version: Cisco Web Security Appliance |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040464" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0087", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:55:02.579825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T20:59:59.861Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Web Security Appliance" } ] } ], "datePublic": "2018-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "103407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040464" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance", "version": { "version_data": [ { "version_value": "Cisco Web Security Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "103407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103407" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "name": "1040464", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040464" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0087", "datePublished": "2018-03-08T07:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T20:59:59.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20653
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:17:52.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20653", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T16:01:54.863072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:30:09.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-17T15:00:34", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "source": { "advisory": "cisco-sa-esa-dos-MxZvGtgU", "defect": [ [ "CSCvy63674" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-02-17T00:00:00", "ID": "CVE-2022-20653", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20220217 Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ] }, "source": { "advisory": "cisco-sa-esa-dos-MxZvGtgU", "defect": [ [ "CSCvy63674" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20653", "datePublished": "2022-02-17T15:00:34.138914Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:30:09.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20675
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:17:53.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20675", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T16:01:49.578940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:28:19.864Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:13:42", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "source": { "advisory": "cisco-sa-ESA-SNMP-JLAJksWK", "defect": [ [ "CSCwa06167", "CSCwa07400", "CSCwa08629" ] ], "discovery": "INTERNAL" }, "title": "Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20675", "STATE": "PUBLIC", "TITLE": "Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-248" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ] }, "source": { "advisory": "cisco-sa-ESA-SNMP-JLAJksWK", "defect": [ [ "CSCwa06167", "CSCwa07400", "CSCwa08629" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20675", "datePublished": "2022-04-06T18:13:42.752369Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:28:19.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3546
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:54.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3546", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:06.166292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:09:21.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T02:25:16", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "source": { "advisory": "cisco-sa-esa-info-disclosure-vMJMMgJ", "defect": [ [ "CSCvp01770" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-02T16:00:00", "ID": "CVE-2020-3546", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200902 Cisco Email Security Appliance Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ] }, "source": { "advisory": "cisco-sa-esa-info-disclosure-vMJMMgJ", "defect": [ [ "CSCvp01770" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3546", "datePublished": "2020-09-04T02:25:16.615739Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:09:21.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3381
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381 | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=36062 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:05.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-19T01:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-3381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141013 Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-3381", "datePublished": "2014-10-19T01:00:00", "dateReserved": "2014-05-07T00:00:00", "dateUpdated": "2024-08-06T10:43:05.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1359
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:16.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:41:27.526029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:07:24.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-112", "description": "CWE-112", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-08T18:35:10", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "source": { "advisory": "cisco-sa-scr-web-priv-esc-k3HCGJZ", "defect": [ [ "CSCvv81569" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-07-07T16:00:00", "ID": "CVE-2021-1359", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-112" } ] } ] }, "references": { "reference_data": [ { "name": "20210707 Cisco Web Security Appliance Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ] }, "source": { "advisory": "cisco-sa-scr-web-priv-esc-k3HCGJZ", "defect": [ [ "CSCvv81569" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1359", "datePublished": "2021-07-08T18:35:10.824368Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:07:24.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1884
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < 10.5.5-005 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1884", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:57:58.500412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:20:16.823Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "10.5.5-005", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-04T19:50:14", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "source": { "advisory": "cisco-sa-20190703-asyncos-wsa", "defect": [ [ "CSCvo29853" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1884", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "10.5.5-005" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ] }, "source": { "advisory": "cisco-sa-20190703-asyncos-wsa", "defect": [ [ "CSCvo29853" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1884", "datePublished": "2019-07-04T19:50:14.713033Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:20:16.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1566
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:43:43.312770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:08:10.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-296", "description": "CWE-296", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T17:45:41", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "source": { "advisory": "cisco-sa-esa-wsa-cert-vali-n8L97RW", "defect": [ [ "CSCvw08342", "CSCvw08378" ] ], "discovery": "INTERNAL" }, "title": "Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-06-16T16:00:00", "ID": "CVE-2021-1566", "STATE": "PUBLIC", "TITLE": "Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.4", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-296" } ] } ] }, "references": { "reference_data": [ { "name": "20210616 Cisco\u00a0Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ] }, "source": { "advisory": "cisco-sa-esa-wsa-cert-vali-n8L97RW", "defect": [ [ "CSCvw08342", "CSCvw08378" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1566", "datePublished": "2021-06-16T17:45:41.215864Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:08:10.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0605
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/72528 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/62829 | third-party-advisory, x_refsource_SECUNIA | |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605 | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=37384 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100695 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "72528", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "72528", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "72528", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72528" }, { "name": "62829", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62829" }, { "name": "20150206 Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "name": "cisco-asyncos-cve20150605-sec-bypass(100695)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0605", "datePublished": "2015-02-07T02:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1886
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/109049 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: unspecified < 10.5.5-005 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109049" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1886", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:48.968119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:49.939Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "lessThan": "10.5.5-005", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-05T09:06:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109049" } ], "source": { "advisory": "cisco-sa-20190703-wsa-dos", "defect": [ [ "CSCvo33747" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1886", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "10.5.5-005" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "name": "109049", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109049" } ] }, "source": { "advisory": "cisco-sa-20190703-wsa-dos", "defect": [ [ "CSCvo33747" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1886", "datePublished": "2019-07-04T19:50:10.367933Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:49.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3368
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3368", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:21:08.491590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:00:26.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:17:22", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-WO4BZ75s", "defect": [ [ "CSCvs66918" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3368", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-WO4BZ75s", "defect": [ [ "CSCvs66918" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3368", "datePublished": "2020-06-18T02:17:22.405008Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:00:26.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20952
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Secure Web Appliance |
Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 14.5.0-498 Version: 14.0.3-014 Version: 14.0.2-012 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-wsa-bypass-bwBfugek", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Web Appliance", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.8.0-414" }, { "status": "affected", "version": "11.8.1-023" }, { "status": "affected", "version": "11.8.3-018" }, { "status": "affected", "version": "11.8.3-021" }, { "status": "affected", "version": "12.0.1-268" }, { "status": "affected", "version": "12.0.3-007" }, { "status": "affected", "version": "12.5.2-007" }, { "status": "affected", "version": "12.5.1-011" }, { "status": "affected", "version": "12.5.4-005" }, { "status": "affected", "version": "12.5.5-004" }, { "status": "affected", "version": "14.5.0-498" }, { "status": "affected", "version": "14.0.3-014" }, { "status": "affected", "version": "14.0.2-012" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:24.396Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-wsa-bypass-bwBfugek", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "source": { "advisory": "cisco-sa-wsa-bypass-bwBfugek", "defects": [ "CSCwc54898" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20952", "datePublished": "2023-02-16T15:27:16.003Z", "dateReserved": "2021-11-02T13:28:29.194Z", "dateUpdated": "2024-08-03T02:31:59.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3367
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:22:09.659342Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:38:34.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T17:40:59", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "source": { "advisory": "cisco-sa-wsa-prv-esc-nPzWZrQj", "defect": [ [ "CSCvs65863" ] ], "discovery": "INTERNAL" }, "title": "Cisco Secure Web Appliance Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-11-18T16:00:00", "ID": "CVE-2020-3367", "STATE": "PUBLIC", "TITLE": "Cisco Secure Web Appliance Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ] }, "source": { "advisory": "cisco-sa-wsa-prv-esc-nPzWZrQj", "defect": [ [ "CSCvs65863" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3367", "datePublished": "2020-11-18T17:40:59.859609Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:38:34.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-34698
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34698", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:47:20.698422Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:47:53.922Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T19:46:52", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "source": { "advisory": "cisco-sa-wsa-dos-fmHdKswk", "defect": [ [ "CSCvv43704", "CSCvw11261", "CSCvz00720" ] ], "discovery": "INTERNAL" }, "title": "Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34698", "STATE": "PUBLIC", "TITLE": "Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-401" } ] } ] }, "references": { "reference_data": [ { "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ] }, "source": { "advisory": "cisco-sa-wsa-dos-fmHdKswk", "defect": [ [ "CSCvv43704", "CSCvw11261", "CSCvz00720" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34698", "datePublished": "2021-10-06T19:46:52.857611Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:47:53.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3568
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3 | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Email Security Appliance (ESA) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:55.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3568", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:12:34.051182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:52:26.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance (ESA)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T04:20:43", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "source": { "advisory": "cisco-sa-esa-url-bypass-zZtugtg3", "defect": [ [ "CSCvu50941", "CSCvu53078" ] ], "discovery": "INTERNAL" }, "title": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-10-07T16:00:00", "ID": "CVE-2020-3568", "STATE": "PUBLIC", "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance (ESA)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20201007 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ] }, "source": { "advisory": "cisco-sa-esa-url-bypass-zZtugtg3", "defect": [ [ "CSCvu50941", "CSCvu53078" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3568", "datePublished": "2020-10-08T04:20:43.311961Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:52:26.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201507-0516
Vulnerability from variot
The LDAP implementation on the Cisco Web Security Appliance (WSA) 8.5.0-000, Email Security Appliance (ESA) 8.5.7-042, and Content Security Management Appliance (SMA) 8.3.6-048 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470. Vendors have confirmed this vulnerability Bug ID CSCuo29561 , CSCuv40466 ,and CSCuv40470 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) May masquerade as a server through a crafted certificate and retrieve important information. The Cisco WSA is a set of web security appliances. ESA is a set of email security devices. Content SMA is a set of content security management devices. A number of Cisco product LDAP servers have security vulnerabilities. The program failed to validate the X.509 certificate on the SSL server side. Multiple Cisco Products are prone to a security-bypass vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks and perform certain unauthorized actions, which will aid in further attacks. This issue is being tracked by Cisco Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0516", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "content security management appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "8.3.6-048" }, { "model": "web security appliance", "scope": "eq", "trust": 2.2, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.3.6-048 (cisco content security management appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.0.000 (cisco web security the appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.7-042 (cisco e email security the appliance )" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.0.000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "BID", "id": "76070" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:web_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management_appliance:8.3.6-048:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4288" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "76070" } ], "trust": 0.3 }, "cve": "CVE-2015-4288", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-4288", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2015-05072", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-82249", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4288", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-05072", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201507-801", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82249", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "VULHUB", "id": "VHN-82249" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The LDAP implementation on the Cisco Web Security Appliance (WSA) 8.5.0-000, Email Security Appliance (ESA) 8.5.7-042, and Content Security Management Appliance (SMA) 8.3.6-048 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470. Vendors have confirmed this vulnerability Bug ID CSCuo29561 , CSCuv40466 ,and CSCuv40470 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) May masquerade as a server through a crafted certificate and retrieve important information. The Cisco WSA is a set of web security appliances. ESA is a set of email security devices. Content SMA is a set of content security management devices. A number of Cisco product LDAP servers have security vulnerabilities. The program failed to validate the X.509 certificate on the SSL server side. Multiple Cisco Products are prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to perform man-in-the-middle attacks and perform certain unauthorized actions, which will aid in further attacks. \nThis issue is being tracked by Cisco Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470", "sources": [ { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "BID", "id": "76070" }, { "db": "VULHUB", "id": "VHN-82249" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4288", "trust": 3.4 }, { "db": "BID", "id": "76070", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-003946", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-801", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-05072", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82249", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "VULHUB", "id": "VHN-82249" }, { "db": "BID", "id": "76070" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "id": "VAR-201507-0516", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "VULHUB", "id": "VHN-82249" } ], "trust": 1.1425819499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" } ] }, "last_update_date": "2023-12-18T13:14:36.968000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "40137", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=40137" }, { "title": "Patch for Multiple Cisco Product LDAP Server SSL Certificate Validation Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/61822" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82249" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=40137" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4288" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4288" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "VULHUB", "id": "VHN-82249" }, { "db": "BID", "id": "76070" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-05072" }, { "db": "VULHUB", "id": "VHN-82249" }, { "db": "BID", "id": "76070" }, { "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "db": "NVD", "id": "CVE-2015-4288" }, { "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-08-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-05072" }, { "date": "2015-07-29T00:00:00", "db": "VULHUB", "id": "VHN-82249" }, { "date": "2015-07-24T00:00:00", "db": "BID", "id": "76070" }, { "date": "2015-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "date": "2015-07-29T01:59:06.890000", "db": "NVD", "id": "CVE-2015-4288" }, { "date": "2015-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-08-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-05072" }, { "date": "2015-07-29T00:00:00", "db": "VULHUB", "id": "VHN-82249" }, { "date": "2015-07-24T00:00:00", "db": "BID", "id": "76070" }, { "date": "2015-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003946" }, { "date": "2015-07-29T17:07:46.400000", "db": "NVD", "id": "CVE-2015-4288" }, { "date": "2015-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-801" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-801" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security Appliance LDAP Vulnerability in server implementation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003946" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-801" } ], "trust": 0.6 } }
var-201606-0287
Vulnerability from variot
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210. Vendors have confirmed this vulnerability Bug ID CSCuy39210 It is released as. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlBy a third party ZIP Spam filtering can be bypassed through the crafted and crafted content of the archive. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.7.0-125" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1438" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "91371" } ], "trust": 0.3 }, "cve": "CVE-2016-1438", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1438", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-04304", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90257", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1438", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1438", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-04304", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201606-503", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90257", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "VULHUB", "id": "VHN-90257" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210. Vendors have confirmed this vulnerability Bug ID CSCuy39210 It is released as. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlBy a third party ZIP Spam filtering can be bypassed through the crafted and crafted content of the archive. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "BID", "id": "91371" }, { "db": "VULHUB", "id": "VHN-90257" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1438", "trust": 3.4 }, { "db": "SECTRACK", "id": "1036156", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-003323", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2016-04304", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201606-503", "trust": 0.6 }, { "db": "BID", "id": "91371", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-90257", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "VULHUB", "id": "VHN-90257" }, { "db": "BID", "id": "91371" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "id": "VAR-201606-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "VULHUB", "id": "VHN-90257" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" } ] }, "last_update_date": "2023-12-18T13:09:03.324000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160622-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160622-esa" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003323" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-254", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90257" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160622-esa" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036156" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1438" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1438" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "VULHUB", "id": "VHN-90257" }, { "db": "BID", "id": "91371" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-04304" }, { "db": "VULHUB", "id": "VHN-90257" }, { "db": "BID", "id": "91371" }, { "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "db": "NVD", "id": "CVE-2016-1438" }, { "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2016-04304" }, { "date": "2016-06-23T00:00:00", "db": "VULHUB", "id": "VHN-90257" }, { "date": "2016-06-22T00:00:00", "db": "BID", "id": "91371" }, { "date": "2016-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "date": "2016-06-23T00:59:07.037000", "db": "NVD", "id": "CVE-2016-1438" }, { "date": "2016-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2016-04304" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-90257" }, { "date": "2016-06-22T00:00:00", "db": "BID", "id": "91371" }, { "date": "2016-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003323" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2016-1438" }, { "date": "2016-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-503" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-503" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security The appliance Run on device AsyncOS Vulnerable to spam filtering", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003323" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-503" } ], "trust": 0.6 } }
var-201511-0006
Vulnerability from variot
Cisco AsyncOS before 8.5.7-043, 9.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-046 on Email Security Appliance (ESA) devices mishandles malformed fields during body-contains, attachment-contains, every-attachment-contains, attachment-binary-contains, dictionary-match, and attachment-dictionary-match filtering, which allows remote attackers to cause a denial of service (memory consumption) via a crafted attachment in an e-mail message, aka Bug ID CSCuv47151. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuv47151. The vulnerability is caused by the fact that the program does not perform body-contains, attachment-contains, every-attachment-contains, attachment-binary-contains, dictionary-match, and attachment-dictionary-match filters. Correctly handle malformed fields. The following releases are affected: Cisco AsyncOS releases prior to 8.5.7-043, releases 9.x prior to 9.1.1-023, releases 9.5.x and releases 9.6.x prior to 9.6.0-046
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.5.x" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-023" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.6.0-046" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.6.x" }, { "model": "email security appliance", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "8.5.7-043" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.x(\u003c9.1.1-023)" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.5.x" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.6.x(\u003c9.6.0-046)" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.6.0-046" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-023" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.7-043" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "BID", "id": "77436" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6291" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "77436" } ], "trust": 0.3 }, "cve": "CVE-2015-6291", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6291", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-07403", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84252", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6291", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-07403", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-100", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84252", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "VULHUB", "id": "VHN-84252" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS before 8.5.7-043, 9.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-046 on Email Security Appliance (ESA) devices mishandles malformed fields during body-contains, attachment-contains, every-attachment-contains, attachment-binary-contains, dictionary-match, and attachment-dictionary-match filtering, which allows remote attackers to cause a denial of service (memory consumption) via a crafted attachment in an e-mail message, aka Bug ID CSCuv47151. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCuv47151. The vulnerability is caused by the fact that the program does not perform body-contains, attachment-contains, every-attachment-contains, attachment-binary-contains, dictionary-match, and attachment-dictionary-match filters. Correctly handle malformed fields. The following releases are affected: Cisco AsyncOS releases prior to 8.5.7-043, releases 9.x prior to 9.1.1-023, releases 9.5.x and releases 9.6.x prior to 9.6.0-046", "sources": [ { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "BID", "id": "77436" }, { "db": "VULHUB", "id": "VHN-84252" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6291", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034064", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005765", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-100", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07403", "trust": 0.6 }, { "db": "BID", "id": "77436", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-84252", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "VULHUB", "id": "VHN-84252" }, { "db": "BID", "id": "77436" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "id": "VAR-201511-0006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "VULHUB", "id": "VHN-84252" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" } ] }, "last_update_date": "2023-12-18T12:51:38.590000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151104-esa2", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-esa2" }, { "title": "Patch for Cisco AsyncOS Denial of Service Vulnerability (CNVD-2015-07403)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/66475" }, { "title": "Cisco Email Security Appliance AsyncOS Enter the fix for the verification vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58596" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84252" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-esa2" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034064" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6291" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6291" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "VULHUB", "id": "VHN-84252" }, { "db": "BID", "id": "77436" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07403" }, { "db": "VULHUB", "id": "VHN-84252" }, { "db": "BID", "id": "77436" }, { "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "db": "NVD", "id": "CVE-2015-6291" }, { "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07403" }, { "date": "2015-11-06T00:00:00", "db": "VULHUB", "id": "VHN-84252" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77436" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "date": "2015-11-06T03:59:00.090000", "db": "NVD", "id": "CVE-2015-6291" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07403" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84252" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77436" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005765" }, { "date": "2016-12-07T18:19:19.717000", "db": "NVD", "id": "CVE-2015-6291" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-100" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-100" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Runs on the appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005765" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-100" } ], "trust": 0.6 } }
var-201907-0230
Vulnerability from variot
A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. AsyncOS Software is a set of operating systems used in it. This issue is being tracked by Cisco Bug ID CSCvo33747
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10.5.2-072" }, { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10.5.3-025" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "10.5" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.5" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "10.5.5-005" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.7.0-fcs-334" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.7.0-fcs-334", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "web security appliance 11.7.0-fcs-418", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-418" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-406" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.5-005" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.5-005" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "BID", "id": "109049" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-334:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.3-025:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1886" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "109049" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ], "trust": 0.9 }, "cve": "CVE-2019-1886", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1886", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-25710", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-151248", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1886", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1886", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1886", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-25710", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201907-237", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-151248", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "VULHUB", "id": "VHN-151248" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. AsyncOS Software is a set of operating systems used in it. \nThis issue is being tracked by Cisco Bug ID CSCvo33747", "sources": [ { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "BID", "id": "109049" }, { "db": "VULHUB", "id": "VHN-151248" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1886", "trust": 3.4 }, { "db": "BID", "id": "109049", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2019-006270", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-237", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25710", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2446", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-151248", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "VULHUB", "id": "VHN-151248" }, { "db": "BID", "id": "109049" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "id": "VAR-201907-0230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "VULHUB", "id": "VHN-151248" } ], "trust": 1.29216826 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" } ] }, "last_update_date": "2023-12-18T13:23:40.400000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190703-wsa-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-wsa-dos" }, { "title": "Patch for Cisco Web Security Appliance AsyncOS Software Input Validation Error Vulnerability (CNVD-2019-25710)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/172965" }, { "title": "Cisco Web Security Appliance AsyncOS Software Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=94426" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151248" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-wsa-dos" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/109049" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1886" }, { "trust": 0.9, "url": "http://www.cisco.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1886" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-asyncos-wsa" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-denial-of-service-via-https-certificate-29693" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2446/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "VULHUB", "id": "VHN-151248" }, { "db": "BID", "id": "109049" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25710" }, { "db": "VULHUB", "id": "VHN-151248" }, { "db": "BID", "id": "109049" }, { "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "db": "NVD", "id": "CVE-2019-1886" }, { "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25710" }, { "date": "2019-07-04T00:00:00", "db": "VULHUB", "id": "VHN-151248" }, { "date": "2019-07-03T00:00:00", "db": "BID", "id": "109049" }, { "date": "2019-07-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "date": "2019-07-04T20:15:11", "db": "NVD", "id": "CVE-2019-1886" }, { "date": "2019-07-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25710" }, { "date": "2020-10-16T00:00:00", "db": "VULHUB", "id": "VHN-151248" }, { "date": "2019-07-03T00:00:00", "db": "BID", "id": "109049" }, { "date": "2019-07-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006270" }, { "date": "2020-10-16T15:08:42.113000", "db": "NVD", "id": "CVE-2019-1886" }, { "date": "2020-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-237" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-237" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006270" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-237" } ], "trust": 0.6 } }
var-201406-0306
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888. Cisco AsyncOS Multiple products that run on have cross-site scripting vulnerabilities. Cisco AsyncOS Multiple products that run on the date_range Cross-site scripting vulnerability due to parameters (CWE-79) Exists. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') http://cwe.mitre.org/data/definitions/79.htmlAn arbitrary script may be executed on the user's web browser. The Cisco IronPort family of products is a widely used mail encryption gateway, and AsyncOS is the operating system used by the product. The vulnerability stems from a program failing to properly filter user-supplied input. An attacker could exploit this vulnerability to execute arbitrary code in the context of the affected site user's browser, stealing cookie-based authentication credentials. And launch other attacks. This issue is being tracked by Cisco Bug IDs CSCun07998, CSCun07844 and CSCun07888. Cisco AsyncOS on Email Security Appliance (ESA) and others are products of Cisco (Cisco). Cisco ESA is an email security appliance. Cisco Content Security Management Appliance (SMA) is a content security management appliance. Cisco Web Security Appliance (WSA) is a set of network security appliances
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "8.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "8.3" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(esa) 8.0" }, { "model": "web security the appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(wsa) 8.0" }, { "model": "content security management appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(sma) 8.3" }, { "model": "ironport asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNNVD", "id": "CNNVD-201406-171" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3289" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "67943" } ], "trust": 0.3 }, "cve": "CVE-2014-3289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2014-002803", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2014-03650", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-71229", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3289", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2014-002803", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-03650", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201406-171", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71229", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "VULHUB", "id": "VHN-71229" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNNVD", "id": "CNNVD-201406-171" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888. Cisco AsyncOS Multiple products that run on have cross-site scripting vulnerabilities. Cisco AsyncOS Multiple products that run on the date_range Cross-site scripting vulnerability due to parameters (CWE-79) Exists. CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) http://cwe.mitre.org/data/definitions/79.htmlAn arbitrary script may be executed on the user\u0027s web browser. The Cisco IronPort family of products is a widely used mail encryption gateway, and AsyncOS is the operating system used by the product. The vulnerability stems from a program failing to properly filter user-supplied input. An attacker could exploit this vulnerability to execute arbitrary code in the context of the affected site user\u0027s browser, stealing cookie-based authentication credentials. And launch other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCun07998, CSCun07844 and CSCun07888. Cisco AsyncOS on Email Security Appliance (ESA) and others are products of Cisco (Cisco). Cisco ESA is an email security appliance. Cisco Content Security Management Appliance (SMA) is a content security management appliance. Cisco Web Security Appliance (WSA) is a set of network security appliances", "sources": [ { "db": "NVD", "id": "CVE-2014-3289" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "BID", "id": "67943" }, { "db": "VULHUB", "id": "VHN-71229" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3289", "trust": 3.4 }, { "db": "BID", "id": "67943", "trust": 2.0 }, { "db": "CERT/CC", "id": "VU#613308", "trust": 1.9 }, { "db": "SECUNIA", "id": "58296", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "127004", "trust": 1.1 }, { "db": "SECTRACK", "id": "1030407", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU98777725", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-002803", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201406-171", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-03650", "trust": 0.6 }, { "db": "FULLDISC", "id": "20140609 CISCO ASYNCOS CROSS-SITE SCRIPTING VULNERABILITY CVE-2014-3289", "trust": 0.6 }, { "db": "CISCO", "id": "20140609 CISCO ASYNCOS CROSS-SITE SCRIPTING VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-71229", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "VULHUB", "id": "VHN-71229" }, { "db": "BID", "id": "67943" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNNVD", "id": "CNNVD-201406-171" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "id": "VAR-201406-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "VULHUB", "id": "VHN-71229" } ], "trust": 1.1813291333333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" } ] }, "last_update_date": "2024-04-19T22:53:14.528000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS Cross-Site Scripting Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3289" }, { "title": "34569", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34569" }, { "title": "Patch for Cisco AsyncOS Software Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/46394" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71229" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/613308" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/67943" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3289" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34569" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2014/jun/57" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/127004/cisco-ironport-email-security-virtual-appliance-8.0.0-671-xss.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1030407" }, { "trust": 1.1, "url": "http://secunia.com/advisories/58296" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3289" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu98777725/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3289" }, { "trust": 0.3, "url": "www.cisco.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "VULHUB", "id": "VHN-71229" }, { "db": "BID", "id": "67943" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNNVD", "id": "CNNVD-201406-171" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-03650" }, { "db": "VULHUB", "id": "VHN-71229" }, { "db": "BID", "id": "67943" }, { "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "db": "CNNVD", "id": "CNNVD-201406-171" }, { "db": "NVD", "id": "CVE-2014-3289" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03650" }, { "date": "2014-06-10T00:00:00", "db": "VULHUB", "id": "VHN-71229" }, { "date": "2014-06-09T00:00:00", "db": "BID", "id": "67943" }, { "date": "2014-06-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "date": "2014-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-171" }, { "date": "2014-06-10T11:19:35.797000", "db": "NVD", "id": "CVE-2014-3289" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03650" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-71229" }, { "date": "2014-06-10T05:43:00", "db": "BID", "id": "67943" }, { "date": "2014-06-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002803" }, { "date": "2014-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-171" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2014-3289" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS Cross-site scripting vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002803" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-171" } ], "trust": 0.6 } }
var-202009-0495
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation. This device is mainly used to manage all policies, reports, audit information, etc. of email and web security devices. AsyncOS Software is a set of operating systems running on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-0495", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.0.3-251" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0.1-hp5-602" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.0.1-161" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.5.0-059" }, { "model": "asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "12.5.0-633" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.4.0-812" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.1.0-404" }, { "model": "cisco \u30b3\u30f3\u30c6\u30f3\u30c4 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco e \u30e1\u30fc\u30eb \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco asyncos", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:11.4.0-812:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.0.1-161", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.5.0-633", "versionStartIncluding": "12.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:11.0.1-hp5-602:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-404:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.0.3-251", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.0-059", "versionStartIncluding": "12.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1983" } ] }, "cve": "CVE-2019-1983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1983", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-14806", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-152315", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1983", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1983", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1983", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-14806", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202002-989", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-152315", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation. This device is mainly used to manage all policies, reports, audit information, etc. of email and web security devices. AsyncOS Software is a set of operating systems running on it", "sources": [ { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1983", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-011709", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-989", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-14806", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0614", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-152315", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "id": "VAR-202009-0495", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" } ] }, "last_update_date": "2023-12-18T13:56:10.166000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20200219-esa-sma-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200219-esa-sma-dos" }, { "title": "Patch for Cisco Content Security Management Appliance and Cisco Email Security Appliance Input Validation Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/206247" }, { "title": "Cisco Content Security Management Appliance and Cisco Email Security Appliance Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=110041" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-152315" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200219-esa-sma-dos" }, { "trust": 1.2, "url": "https://vigilance.fr/vulnerability/cisco-esa-csma-denial-of-service-via-email-attachments-31639" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1983" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0614/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "VULHUB", "id": "VHN-152315" }, { "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "db": "NVD", "id": "CVE-2019-1983" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-14806" }, { "date": "2020-09-23T00:00:00", "db": "VULHUB", "id": "VHN-152315" }, { "date": "2021-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "date": "2020-09-23T01:15:14.613000", "db": "NVD", "id": "CVE-2019-1983" }, { "date": "2020-02-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-14806" }, { "date": "2020-10-01T00:00:00", "db": "VULHUB", "id": "VHN-152315" }, { "date": "2021-04-12T06:09:00", "db": "JVNDB", "id": "JVNDB-2020-011709" }, { "date": "2020-10-01T14:59:14.263000", "db": "NVD", "id": "CVE-2019-1983" }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-989" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-989" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Content Security Management Appliance and Cisco Email Security Appliance Input Validation Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-14806" }, { "db": "CNNVD", "id": "CNNVD-202002-989" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-989" } ], "trust": 0.6 } }
var-201702-0792
Vulnerability from variot
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233. Vendors have confirmed this vulnerability Bug ID SCvb91473 and CSCvc76500 It is released as.A remote attacker may be able to bypass user filters configured on the device. Cisco AsyncOS is a set of operating systems used in these products. A remote security bypass vulnerability exists in CiscoAsyncOSforEmail and WebSecurityAppliances. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions, resulting in further attacks. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCvb91473. The title and technical details have been changed to better reflect the vulnerability impact. The Multipurpose Internet Mail Extensions (MIME) scanner is one of those email scanners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0792", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "10.0.0-203" }, { "model": "email security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "9.9.9-894" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-232" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-232" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-203" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "10.0.0-233" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.2-148" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.0-035" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.2-020" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.1-103" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "BID", "id": "96239" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-082:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.9.6-026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-082:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-124:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-232:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.9.9-894:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-203:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-232:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.0.0-203:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-124:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-3827" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "96239" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ], "trust": 0.9 }, "cve": "CVE-2017-3827", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-3827", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-01890", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-112030", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-3827", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-3827", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-01890", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201702-660", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-112030", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "VULHUB", "id": "VHN-112030" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233. Vendors have confirmed this vulnerability Bug ID SCvb91473 and CSCvc76500 It is released as.A remote attacker may be able to bypass user filters configured on the device. Cisco AsyncOS is a set of operating systems used in these products. A remote security bypass vulnerability exists in CiscoAsyncOSforEmail and WebSecurityAppliances. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions, resulting in further attacks. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCvb91473. The title and technical details have been changed to better reflect the vulnerability impact. The Multipurpose Internet Mail Extensions (MIME) scanner is one of those email scanners", "sources": [ { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "BID", "id": "96239" }, { "db": "VULHUB", "id": "VHN-112030" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-3827", "trust": 3.4 }, { "db": "BID", "id": "96239", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037831", "trust": 1.7 }, { "db": "SECTRACK", "id": "1037832", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-001728", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201702-660", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-01890", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-112030", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "VULHUB", "id": "VHN-112030" }, { "db": "BID", "id": "96239" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "id": "VAR-201702-0792", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "VULHUB", "id": "VHN-112030" } ], "trust": 1.2410863666666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" } ] }, "last_update_date": "2023-12-18T13:29:25.579000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170215-asyncos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170215-asyncos" }, { "title": "CiscoAsyncOSforEmail and WebSecurityAppliances Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/89710" }, { "title": "Cisco AsyncOS Software for Cisco ESA and Cisco WSA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68171" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112030" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/96239" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170215-asyncos" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1037831" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1037832" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3827" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-3827" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "VULHUB", "id": "VHN-112030" }, { "db": "BID", "id": "96239" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-01890" }, { "db": "VULHUB", "id": "VHN-112030" }, { "db": "BID", "id": "96239" }, { "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "db": "NVD", "id": "CVE-2017-3827" }, { "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-24T00:00:00", "db": "CNVD", "id": "CNVD-2017-01890" }, { "date": "2017-02-22T00:00:00", "db": "VULHUB", "id": "VHN-112030" }, { "date": "2017-02-15T00:00:00", "db": "BID", "id": "96239" }, { "date": "2017-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "date": "2017-02-22T02:59:00.230000", "db": "NVD", "id": "CVE-2017-3827" }, { "date": "2017-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-24T00:00:00", "db": "CNVD", "id": "CNVD-2017-01890" }, { "date": "2017-07-25T00:00:00", "db": "VULHUB", "id": "VHN-112030" }, { "date": "2017-05-23T16:26:00", "db": "BID", "id": "96239" }, { "date": "2017-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001728" }, { "date": "2021-08-06T16:50:21.190000", "db": "NVD", "id": "CVE-2017-3827" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-660" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-660" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ESA and WSA of AsyncOS Software MIME Vulnerability in the scanner that bypasses the user filter set on the device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001728" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-660" } ], "trust": 0.6 } }
var-201905-0514
Vulnerability from variot
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of HTTP and HTTPS requests. An attacker could exploit this vulnerability by sending a malformed HTTP or HTTPS request to an affected device. An exploit could allow the attacker to cause a restart of the web proxy process, resulting in a temporary DoS condition. This issue is being tracked by Cisco Bug ID CSCvn31450. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS Software is an operating system used in it. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0514", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.1-fcs-115" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.1-fcs-124" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.1-fcs-125" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.7.0-fcs-334" }, { "model": "web security the appliance software", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.7.0-fcs-334", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.5.1-fcs-125", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.5.1-fcs-124", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.5.1-fcs-115", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.7" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-406" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-406" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.8-113" } ], "sources": [ { "db": "BID", "id": "108130" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-115:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-124:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-334:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1817" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco,Cisco ?? ??", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-020" } ], "trust": 0.6 }, "cve": "CVE-2019-1817", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1817", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-150489", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1817", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1817", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1817", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201905-020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-150489", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-150489" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of HTTP and HTTPS requests. An attacker could exploit this vulnerability by sending a malformed HTTP or HTTPS request to an affected device. An exploit could allow the attacker to cause a restart of the web proxy process, resulting in a temporary DoS condition. \nThis issue is being tracked by Cisco Bug ID CSCvn31450. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS Software is an operating system used in it. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "BID", "id": "108130" }, { "db": "VULHUB", "id": "VHN-150489" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1817", "trust": 2.8 }, { "db": "BID", "id": "108130", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2019-003882", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201905-020", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1520", "trust": 0.6 }, { "db": "NSFOCUS", "id": "43205", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-150489", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-150489" }, { "db": "BID", "id": "108130" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "id": "VAR-201905-0514", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-150489" } ], "trust": 0.69216826 }, "last_update_date": "2023-12-18T12:00:12.327000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190501-wsa-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-wsa-dos" }, { "title": "Cisco Web Security Appliance Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92171" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-150489" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-wsa-dos" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1817" }, { "trust": 0.9, "url": "http://www.cisco.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1817" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-wsa-privesc" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-denial-of-service-via-malformed-http-s-request-29189" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/43205" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108130" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/80118" } ], "sources": [ { "db": "VULHUB", "id": "VHN-150489" }, { "db": "BID", "id": "108130" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-150489" }, { "db": "BID", "id": "108130" }, { "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "db": "NVD", "id": "CVE-2019-1817" }, { "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-03T00:00:00", "db": "VULHUB", "id": "VHN-150489" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108130" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "date": "2019-05-03T17:29:01", "db": "NVD", "id": "CVE-2019-1817" }, { "date": "2019-05-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-150489" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108130" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003882" }, { "date": "2023-03-24T17:39:25.263000", "db": "NVD", "id": "CVE-2019-1817" }, { "date": "2019-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance of AsyncOS Software input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003882" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-020" } ], "trust": 0.6 } }
var-201405-0472
Vulnerability from variot
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. Vendors have confirmed this vulnerability Bug ID CSCum86085 It is released as.A third party could gain the role's privileges by using the similarity of group names. The Cisco Email Security Appliance is an EMAIL security gateway from Cisco. AsyncOS is the operating system used by the product to handle bottlenecks in concurrent communications and file-based mail queues. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCum86085. A remote attacker could exploit this vulnerability to gain privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0472", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "7.6(.2)" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2195" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "67494" } ], "trust": 0.3 }, "cve": "CVE-2014-2195", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-2195", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-03188", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-70134", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2195", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-03188", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201405-381", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-70134", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "VULHUB", "id": "VHN-70134" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. Vendors have confirmed this vulnerability Bug ID CSCum86085 It is released as.A third party could gain the role\u0027s privileges by using the similarity of group names. The Cisco Email Security Appliance is an EMAIL security gateway from Cisco. AsyncOS is the operating system used by the product to handle bottlenecks in concurrent communications and file-based mail queues. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nThis issue is being tracked by Cisco Bug ID CSCum86085. A remote attacker could exploit this vulnerability to gain privileges", "sources": [ { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "BID", "id": "67494" }, { "db": "VULHUB", "id": "VHN-70134" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2195", "trust": 3.4 }, { "db": "SECTRACK", "id": "1030258", "trust": 1.1 }, { "db": "BID", "id": "67494", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-002548", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201405-381", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-03188", "trust": 0.6 }, { "db": "CISCO", "id": "20140519 CISCO ASYNCOS SOFTWARE ADMINISTRATION ROLE AUTHORIZATION VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-70134", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "VULHUB", "id": "VHN-70134" }, { "db": "BID", "id": "67494" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "id": "VAR-201405-0472", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "VULHUB", "id": "VHN-70134" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" } ] }, "last_update_date": "2023-12-18T14:01:58.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS Software Administration Role Authorization Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-2195" }, { "title": "34294", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34294" }, { "title": "Cisco Email Security Appliance Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/45845" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70134" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-2195" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1030258" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2195" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2195" }, { "trust": 0.3, "url": "www.cisco.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "VULHUB", "id": "VHN-70134" }, { "db": "BID", "id": "67494" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "VULHUB", "id": "VHN-70134" }, { "db": "BID", "id": "67494" }, { "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "db": "NVD", "id": "CVE-2014-2195" }, { "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2014-03188" }, { "date": "2014-05-20T00:00:00", "db": "VULHUB", "id": "VHN-70134" }, { "date": "2014-05-19T00:00:00", "db": "BID", "id": "67494" }, { "date": "2014-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "date": "2014-05-20T11:13:37.593000", "db": "NVD", "id": "CVE-2014-2195" }, { "date": "2014-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2014-03188" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-70134" }, { "date": "2014-05-21T00:43:00", "db": "BID", "id": "67494" }, { "date": "2014-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002548" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2014-2195" }, { "date": "2014-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-381" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-381" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance Remote Security Bypass Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2014-03188" }, { "db": "BID", "id": "67494" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-381" } ], "trust": 0.6 } }
var-201612-0159
Vulnerability from variot
A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCva90076 , CSCvb06764 It is released as.A remote attacker may be able to bypass the configured user filter. CiscoEmailSecurityAppliance is a Cisco email security appliance. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCva90076. Note:The issue affects all the devices running Cisco AsyncOS Software. The vulnerability stems from the fact that the program cannot properly filter certain TAR format files
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0159", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-232" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-232" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "BID", "id": "94901" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:10.0.0-232:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6465" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94901" } ], "trust": 0.3 }, "cve": "CVE-2016-6465", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-6465", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-12543", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-95285", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-6465", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6465", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-12543", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-231", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95285", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "VULHUB", "id": "VHN-95285" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCva90076 , CSCvb06764 It is released as.A remote attacker may be able to bypass the configured user filter. CiscoEmailSecurityAppliance is a Cisco email security appliance. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCva90076. \nNote:The issue affects all the devices running Cisco AsyncOS Software. The vulnerability stems from the fact that the program cannot properly filter certain TAR format files", "sources": [ { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "BID", "id": "94901" }, { "db": "VULHUB", "id": "VHN-95285" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6465", "trust": 3.4 }, { "db": "BID", "id": "94901", "trust": 1.4 }, { "db": "SECTRACK", "id": "1037404", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-006305", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2016-12543", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201612-231", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95285", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "VULHUB", "id": "VHN-95285" }, { "db": "BID", "id": "94901" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "id": "VAR-201612-0159", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "VULHUB", "id": "VHN-95285" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" } ] }, "last_update_date": "2023-12-18T13:24:36.124000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161207-esa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-esa" }, { "title": "Patch for CiscoEmailSecurityAppliance Security Bypass Vulnerability (CNVD-2016-12543)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/86150" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66268" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95285" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-esa" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/94901" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037404" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6465" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6465" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "VULHUB", "id": "VHN-95285" }, { "db": "BID", "id": "94901" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-12543" }, { "db": "VULHUB", "id": "VHN-95285" }, { "db": "BID", "id": "94901" }, { "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "db": "NVD", "id": "CVE-2016-6465" }, { "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-12543" }, { "date": "2016-12-14T00:00:00", "db": "VULHUB", "id": "VHN-95285" }, { "date": "2016-12-07T00:00:00", "db": "BID", "id": "94901" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "date": "2016-12-14T00:59:04.547000", "db": "NVD", "id": "CVE-2016-6465" }, { "date": "2016-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-12543" }, { "date": "2017-01-05T00:00:00", "db": "VULHUB", "id": "VHN-95285" }, { "date": "2016-12-20T01:09:00", "db": "BID", "id": "94901" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006305" }, { "date": "2017-01-05T13:41:25.770000", "db": "NVD", "id": "CVE-2016-6465" }, { "date": "2016-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-231" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security For appliance AsyncOS Vulnerability that bypasses the set user filter in the content filtering function of the software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006305" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-231" } ], "trust": 0.6 } }
var-201511-0009
Vulnerability from variot
The admin web interface in Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote authenticated users to obtain root privileges via crafted certificate-generation arguments, aka Bug ID CSCus83445. Vendors have confirmed this vulnerability Bug ID CSCus83445 It is released as.Through a crafted certificate generation argument by a remotely authenticated user, root You may get permission. A remote attacker can exploit this vulnerability to obtain root privileges through a specially crafted certificate-generation parameter. This issue is being tracked by Cisco bug ID CSCus83445
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0009", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.7.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.3-051" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.7.0-171-ld" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.0.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1.x" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.5.x" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.8.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.8-113" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.x(\u003c8.0.8-113)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.1.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5.x(\u003c8.5.3-051)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.7.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.8.x(\u003c8.8.0-085)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "web security appliance 8.7.0-171-ld", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.3-051" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.8-113" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "BID", "id": "77433" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6298" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "77433" } ], "trust": 0.3 }, "cve": "CVE-2015-6298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-6298", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2015-07469", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-84259", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6298", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-07469", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-106", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-84259", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "VULHUB", "id": "VHN-84259" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The admin web interface in Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote authenticated users to obtain root privileges via crafted certificate-generation arguments, aka Bug ID CSCus83445. Vendors have confirmed this vulnerability Bug ID CSCus83445 It is released as.Through a crafted certificate generation argument by a remotely authenticated user, root You may get permission. A remote attacker can exploit this vulnerability to obtain root privileges through a specially crafted certificate-generation parameter. \nThis issue is being tracked by Cisco bug ID CSCus83445", "sources": [ { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "BID", "id": "77433" }, { "db": "VULHUB", "id": "VHN-84259" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6298", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034059", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005768", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-106", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07469", "trust": 0.6 }, { "db": "BID", "id": "77433", "trust": 0.4 }, { "db": "SEEBUG", "id": "SSVID-89770", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-84259", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "VULHUB", "id": "VHN-84259" }, { "db": "BID", "id": "77433" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "id": "VAR-201511-0009", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "VULHUB", "id": "VHN-84259" } ], "trust": 1.14624132 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" } ] }, "last_update_date": "2023-12-18T14:01:48.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151104-wsa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa" }, { "title": "Cisco Web Security Appliance Certificate Generation Command Injection Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/66504" }, { "title": "Cisco Email Security Appliance AsyncOS Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58601" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84259" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034059" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6298" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6298" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "VULHUB", "id": "VHN-84259" }, { "db": "BID", "id": "77433" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07469" }, { "db": "VULHUB", "id": "VHN-84259" }, { "db": "BID", "id": "77433" }, { "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "db": "NVD", "id": "CVE-2015-6298" }, { "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07469" }, { "date": "2015-11-06T00:00:00", "db": "VULHUB", "id": "VHN-84259" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77433" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "date": "2015-11-06T11:59:03.730000", "db": "NVD", "id": "CVE-2015-6298" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07469" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84259" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77433" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005768" }, { "date": "2016-12-07T18:19:23.047000", "db": "NVD", "id": "CVE-2015-6298" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-106" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-106" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Management Web In the interface root Privileged vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005768" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-106" } ], "trust": 0.6 } }
var-201911-1303
Vulnerability from variot
A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS Software is an operating system used in it. AsyncOS Software in Cisco WSA has an access control error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1303", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "10.5" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.7.1-006" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5.2-072" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "10.1" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.7" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.1-fcs-125" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.7.0-fcs-418" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "10.1.5-004" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.5.3-016" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.5-004", "versionStartIncluding": "10.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.5.3-016", "versionStartIncluding": "10.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.7.1-006", "versionStartIncluding": "11.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-418:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15956" } ] }, "cve": "CVE-2019-15956", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-15956", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-148054", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15956", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15956", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-15956", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-376", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-148054", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-148054" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS Software is an operating system used in it. AsyncOS Software in Cisco WSA has an access control error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "VULHUB", "id": "VHN-148054" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15956", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2019-012705", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201911-376", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.4175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-148054", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148054" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "id": "VAR-201911-1303", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-148054" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T13:56:29.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20191106-wsa-unauth-devreset", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191106-wsa-unauth-devreset" }, { "title": "Cisco Web Security Appliance AsyncOS Software Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=101793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-863", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148054" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191106-wsa-unauth-devreset" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15956" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15956" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-denial-of-service-via-device-reset-30807" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4175/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-148054" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-148054" }, { "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "db": "NVD", "id": "CVE-2019-15956" }, { "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-26T00:00:00", "db": "VULHUB", "id": "VHN-148054" }, { "date": "2019-12-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "date": "2019-11-26T03:15:11.440000", "db": "NVD", "id": "CVE-2019-15956" }, { "date": "2019-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-16T00:00:00", "db": "VULHUB", "id": "VHN-148054" }, { "date": "2019-12-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012705" }, { "date": "2020-10-16T13:30:45.507000", "db": "NVD", "id": "CVE-2019-15956" }, { "date": "2020-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-376" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-376" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS Software and Cisco Web Security appliance vulnerable to unauthorized authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012705" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-376" } ], "trust": 0.6 } }
var-201610-0320
Vulnerability from variot
A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233. Vendors have confirmed this vulnerability Bug CSCux56406 and CSCux59928 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. CiscoEmailandWebSecurityAppliance is a product of Cisco. A denial of service vulnerability exists in CiscoEmail and WebSecurityAppliance. An unauthenticated remote attacker exploited the vulnerability to cause a denial of service attack. Multiple Cisco Products are prone to a denial-of-service vulnerability. This issue is being tracked by Cisco Bug IDs CSCux56406 and CSCux59928. Cisco ESA versions after 9.5 and AMP of WSA have a denial of service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0320", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-444" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-193" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-284" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-235" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-070" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-051" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-000" }, { "model": "e email security the appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.5 thats all 9.7.1-066" }, { "model": "web security the appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-233" }, { "model": "web security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "gte", "trust": 0.6, "vendor": "cisco", "version": "9.5" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "BID", "id": "93910" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-444:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-235:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6360" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93910" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ], "trust": 0.9 }, "cve": "CVE-2016-6360", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6360", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10383", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95180", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6360", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6360", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10383", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-770", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95180", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2016-6360", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULHUB", "id": "VHN-95180" }, { "db": "VULMON", "id": "CVE-2016-6360" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233. Vendors have confirmed this vulnerability Bug CSCux56406 and CSCux59928 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. CiscoEmailandWebSecurityAppliance is a product of Cisco. A denial of service vulnerability exists in CiscoEmail and WebSecurityAppliance. An unauthenticated remote attacker exploited the vulnerability to cause a denial of service attack. Multiple Cisco Products are prone to a denial-of-service vulnerability. \nThis issue is being tracked by Cisco Bug IDs CSCux56406 and CSCux59928. Cisco ESA versions after 9.5 and AMP of WSA have a denial of service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "BID", "id": "93910" }, { "db": "VULHUB", "id": "VHN-95180" }, { "db": "VULMON", "id": "CVE-2016-6360" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6360", "trust": 3.5 }, { "db": "BID", "id": "93910", "trust": 2.7 }, { "db": "SECTRACK", "id": "1037120", "trust": 1.2 }, { "db": "SECTRACK", "id": "1037121", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-005651", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-770", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10383", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95180", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6360", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULHUB", "id": "VHN-95180" }, { "db": "VULMON", "id": "CVE-2016-6360" }, { "db": "BID", "id": "93910" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "id": "VAR-201610-0320", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULHUB", "id": "VHN-95180" } ], "trust": 1.1425819499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" } ] }, "last_update_date": "2023-12-18T13:48:45.946000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esawsa3", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa3" }, { "title": "Patches for multiple Cisco product denial of service vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83309" }, { "title": "Cisco Email Security Appliance and Cisco Web Security Appliance Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65123" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-bugs-in-900-series-routers-prime-home-server/121765/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULMON", "id": "CVE-2016-6360" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95180" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/93910" }, { "trust": 2.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa3" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1037120" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1037121" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6360" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6360" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-bugs-in-900-series-routers-prime-home-server/121765/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULHUB", "id": "VHN-95180" }, { "db": "VULMON", "id": "CVE-2016-6360" }, { "db": "BID", "id": "93910" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10383" }, { "db": "VULHUB", "id": "VHN-95180" }, { "db": "VULMON", "id": "CVE-2016-6360" }, { "db": "BID", "id": "93910" }, { "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "db": "NVD", "id": "CVE-2016-6360" }, { "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10383" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-95180" }, { "date": "2016-10-28T00:00:00", "db": "VULMON", "id": "CVE-2016-6360" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93910" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "date": "2016-10-28T10:59:10.213000", "db": "NVD", "id": "CVE-2016-6360" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10383" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95180" }, { "date": "2017-07-29T00:00:00", "db": "VULMON", "id": "CVE-2016-6360" }, { "date": "2016-11-24T01:04:00", "db": "BID", "id": "93910" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005651" }, { "date": "2017-07-29T01:34:17.820000", "db": "NVD", "id": "CVE-2016-6360" }, { "date": "2016-11-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-770" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-770" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Appliance and Web Security Appliance Advanced Malware Protection Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005651" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-770" } ], "trust": 0.6 } }
var-202010-1041
Vulnerability from variot
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. Cisco AsyncOS The software contains an input verification vulnerability.Information may be tampered with. AsyncOS Software is a set of operating systems running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1041", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "13.5.2" }, { "model": "cisco asyncos", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "email security appliance asyncos software", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=13.5.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.5.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-3568" } ] }, "cve": "CVE-2020-3568", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-3568", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-57579", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-181693", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-3568", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-3568", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3568", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2020-57579", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202010-231", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-181693", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. Cisco AsyncOS The software contains an input verification vulnerability.Information may be tampered with. AsyncOS Software is a set of operating systems running in it", "sources": [ { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3568", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012240", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-57579", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3484", "trust": 0.6 }, { "db": "NSFOCUS", "id": "50159", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202010-231", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-181693", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "id": "VAR-202010-1041", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" } ] }, "last_update_date": "2023-12-18T13:01:31.352000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-esa-url-bypass-zZtugtg3", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-url-bypass-zztugtg3" }, { "title": "Patch for Cisco Email Security Appliance URL filtering bypass vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/236893" }, { "title": "Cisco Email Security Appliance Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=129860" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-181693" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-url-bypass-zztugtg3" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3568" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-esa-privilege-escalation-via-url-filtering-bypass-33501" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/50159" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3484/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57579" }, { "db": "VULHUB", "id": "VHN-181693" }, { "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "db": "NVD", "id": "CVE-2020-3568" }, { "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-20T00:00:00", "db": "CNVD", "id": "CNVD-2020-57579" }, { "date": "2020-10-08T00:00:00", "db": "VULHUB", "id": "VHN-181693" }, { "date": "2021-04-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "date": "2020-10-08T05:15:15.383000", "db": "NVD", "id": "CVE-2020-3568" }, { "date": "2020-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-20T00:00:00", "db": "CNVD", "id": "CNVD-2020-57579" }, { "date": "2021-10-19T00:00:00", "db": "VULHUB", "id": "VHN-181693" }, { "date": "2021-04-27T06:50:00", "db": "JVNDB", "id": "JVNDB-2020-012240" }, { "date": "2023-11-07T03:22:55.540000", "db": "NVD", "id": "CVE-2020-3568" }, { "date": "2020-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-231" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco\u00a0AsyncOS\u00a0 Software input verification vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012240" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-231" } ], "trust": 0.6 } }
var-202106-0633
Vulnerability from variot
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. The product mainly has functions such as advanced threat prevention, monitoring and response
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.0.3-005" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "13.5" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "13.0.0-030" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.5.0" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "13.5.3-010" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.5.1-043" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.8.3-021" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "13.0" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.0.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.5.3-035" }, { "model": "cisco e \u30e1\u30fc\u30eb \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco web \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco asyncos", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.3-035", "vulnerable": true } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0.0-030", "versionStartIncluding": "13.0", "vulnerable": true } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.5.3-010", "versionStartIncluding": "13.5", "vulnerable": true } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.8.3-021", "vulnerable": true } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.1-043", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-1566" } ] }, "cve": "CVE-2021-1566", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-1566", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-374620", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1566", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-1566", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1566", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-1319", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374620", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-374620" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. The product mainly has functions such as advanced threat prevention, monitoring and response", "sources": [ { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-374620" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1566", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-008227", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021061621", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2151", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-1319", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374620", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374620" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "id": "VAR-202106-0633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-374620" } ], "trust": 0.54258195 }, "last_update_date": "2023-12-18T10:55:00.861000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-esa-wsa-cert-vali-n8L97RW", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-wsa-cert-vali-n8l97rw" }, { "title": "Cisco\u00a0Advanced Malware Protection Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155298" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.1 }, { "problemtype": "Bad certificate verification (CWE-295) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374620" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-wsa-cert-vali-n8l97rw" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1566" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021061621" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-esa-wsa-man-in-the-middle-via-amp-35708" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2151" } ], "sources": [ { "db": "VULHUB", "id": "VHN-374620" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-374620" }, { "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "db": "NVD", "id": "CVE-2021-1566" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-16T00:00:00", "db": "VULHUB", "id": "VHN-374620" }, { "date": "2022-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "date": "2021-06-16T18:15:08.710000", "db": "NVD", "id": "CVE-2021-1566" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-23T00:00:00", "db": "VULHUB", "id": "VHN-374620" }, { "date": "2022-03-08T08:02:00", "db": "JVNDB", "id": "JVNDB-2021-008227" }, { "date": "2023-11-07T03:28:38.887000", "db": "NVD", "id": "CVE-2021-1566" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1319" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1319" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco\u00a0Email\u00a0Security\u00a0Appliance\u00a0 and \u00a0Cisco\u00a0Web\u00a0Security\u00a0Appliance\u00a0 for \u00a0Cisco\u00a0AsyncOS\u00a0 Vulnerability in Certificate Verification", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-201711-0348
Vulnerability from variot
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666. Cisco AsyncOS The software contains vulnerabilities related to security functions. Vendors have confirmed this vulnerability Bug ID CSCvf44666 It is released as.Information may be tampered with. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. AsyncOS Software is the operating system used in it. Multipurpose Internet Mail Extensions (MIME) scanner is one of the multipurpose mail extension scanners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "BID", "id": "102002" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12353" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mai Ngoc Duong.", "sources": [ { "db": "BID", "id": "102002" } ], "trust": 0.3 }, "cve": "CVE-2017-12353", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12353", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-102867", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12353", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12353", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201711-1213", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-102867", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-102867" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666. Cisco AsyncOS The software contains vulnerabilities related to security functions. Vendors have confirmed this vulnerability Bug ID CSCvf44666 It is released as.Information may be tampered with. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. AsyncOS Software is the operating system used in it. Multipurpose Internet Mail Extensions (MIME) scanner is one of the multipurpose mail extension scanners", "sources": [ { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "BID", "id": "102002" }, { "db": "VULHUB", "id": "VHN-102867" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12353", "trust": 2.8 }, { "db": "BID", "id": "102002", "trust": 2.0 }, { "db": "SECTRACK", "id": "1039917", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-010454", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201711-1213", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-102867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102867" }, { "db": "BID", "id": "102002" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "id": "VAR-201711-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-102867" } ], "trust": 0.53892258 }, "last_update_date": "2023-12-18T12:19:24.121000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20171129-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171129-esa" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010454" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-254", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102867" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171129-esa" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102002" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039917" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12353" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12353" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-102867" }, { "db": "BID", "id": "102002" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-102867" }, { "db": "BID", "id": "102002" }, { "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "db": "NVD", "id": "CVE-2017-12353" }, { "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-30T00:00:00", "db": "VULHUB", "id": "VHN-102867" }, { "date": "2017-11-29T00:00:00", "db": "BID", "id": "102002" }, { "date": "2017-12-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "date": "2017-11-30T09:29:01.073000", "db": "NVD", "id": "CVE-2017-12353" }, { "date": "2017-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-102867" }, { "date": "2017-12-19T22:37:00", "db": "BID", "id": "102002" }, { "date": "2017-12-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010454" }, { "date": "2019-10-09T23:23:00.153000", "db": "NVD", "id": "CVE-2017-12353" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-1213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-1213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS Vulnerabilities related to security functions in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010454" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-1213" } ], "trust": 0.6 } }
var-201507-0242
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in Cisco AsyncOS on the Web Security Appliance (WSA) 9.0.0-193; Email Security Appliance (ESA) 8.5.6-113, 9.1.0-032, 9.1.1-000, and 9.6.0-000; and Content Security Management Appliance (SMA) 9.1.0-033 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuu37430, CSCuu37420, CSCut71981, and CSCuv50167. Vendors have confirmed this vulnerability Bug ID CSCuu37430 , CSCuu37420 , CSCut71981 and CSCuv50167 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. ESA is a set of email security devices. Content SMA is a set of content security management devices. A cross-site scripting vulnerability exists in multiple Cisco product web management interfaces. The program failed to fully validate the parameters. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug IDs CSCuu37430, CSCuu37420, CSCut71981, and CSCuv50167. The vulnerability is caused by the program's insufficient validation of parameters
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0242", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 3.1, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 3.1, "vendor": "cisco", "version": "9.1.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 3.1, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 2.8, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "web security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.0.0-193" }, { "model": "content security management virtual appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-033" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "9.1.0-033" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.6-113 (cisco e email security the appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0.0-193 (cisco web security the appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.0-032 (cisco e email security the appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.0-033 (cisco content security management appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-000 (cisco e email security the appliance )" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.6.0-000 (cisco e email security the appliance )" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "BID", "id": "76053" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_virtual_appliance:9.1.0-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0732" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "76053" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ], "trust": 0.9 }, "cve": "CVE-2015-0732", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0732", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-05073", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-78678", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0732", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-05073", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201507-775", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78678", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "VULHUB", "id": "VHN-78678" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in Cisco AsyncOS on the Web Security Appliance (WSA) 9.0.0-193; Email Security Appliance (ESA) 8.5.6-113, 9.1.0-032, 9.1.1-000, and 9.6.0-000; and Content Security Management Appliance (SMA) 9.1.0-033 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuu37430, CSCuu37420, CSCut71981, and CSCuv50167. Vendors have confirmed this vulnerability Bug ID CSCuu37430 , CSCuu37420 , CSCut71981 and CSCuv50167 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. ESA is a set of email security devices. Content SMA is a set of content security management devices. A cross-site scripting vulnerability exists in multiple Cisco product web management interfaces. The program failed to fully validate the parameters. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCuu37430, CSCuu37420, CSCut71981, and CSCuv50167. The vulnerability is caused by the program\u0027s insufficient validation of parameters", "sources": [ { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "BID", "id": "76053" }, { "db": "VULHUB", "id": "VHN-78678" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0732", "trust": 3.4 }, { "db": "BID", "id": "76053", "trust": 1.6 }, { "db": "SECTRACK", "id": "1033087", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033086", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-775", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-05073", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78678", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "VULHUB", "id": "VHN-78678" }, { "db": "BID", "id": "76053" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "id": "VAR-201507-0242", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "VULHUB", "id": "VHN-78678" } ], "trust": 1.1425819499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" } ] }, "last_update_date": "2023-12-18T13:29:36.245000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "40172", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=40172" }, { "title": "Patch for Multiple Cisco Product Cross-Site Scripting Vulnerabilities (CNVD-2015-05073)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/61823" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78678" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=40172" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033086" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033087" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0732" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0732" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/76053" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/content-security-management-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "VULHUB", "id": "VHN-78678" }, { "db": "BID", "id": "76053" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-05073" }, { "db": "VULHUB", "id": "VHN-78678" }, { "db": "BID", "id": "76053" }, { "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "db": "NVD", "id": "CVE-2015-0732" }, { "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-08-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-05073" }, { "date": "2015-07-29T00:00:00", "db": "VULHUB", "id": "VHN-78678" }, { "date": "2015-07-27T00:00:00", "db": "BID", "id": "76053" }, { "date": "2015-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "date": "2015-07-29T01:59:00.093000", "db": "NVD", "id": "CVE-2015-0732" }, { "date": "2015-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-08-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-05073" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-78678" }, { "date": "2015-07-27T00:00:00", "db": "BID", "id": "76053" }, { "date": "2015-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003943" }, { "date": "2018-10-30T16:27:22.483000", "db": "NVD", "id": "CVE-2015-0732" }, { "date": "2015-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-775" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-775" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security Runs on the appliance AsyncOS Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-775" } ], "trust": 0.6 } }
var-201907-0229
Vulnerability from variot
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. AsyncOSSoftware is a set of operating systems used in it. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCvo29853
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "11.7.0-256" }, { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10.5.2-072" }, { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10.1.4-017" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "10.1" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.7" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "10.5.5-005" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.5" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.1-fcs-125" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.7.0-407" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.5.1-fcs-125", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.7.0-fcs-418", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-418" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-406" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.5-005" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "BID", "id": "109032" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.7.0-407", "versionStartIncluding": "11.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.1.4-017:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-256:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1884" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "109032" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ], "trust": 0.9 }, "cve": "CVE-2019-1884", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1884", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2019-21307", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-151226", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.1, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1884", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1884", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1884", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-21307", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201907-227", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-151226", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "VULHUB", "id": "VHN-151226" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. AsyncOSSoftware is a set of operating systems used in it. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCvo29853", "sources": [ { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "BID", "id": "109032" }, { "db": "VULHUB", "id": "VHN-151226" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1884", "trust": 3.4 }, { "db": "BID", "id": "109032", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2019-006269", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-227", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-21307", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2446", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-151226", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "VULHUB", "id": "VHN-151226" }, { "db": "BID", "id": "109032" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "id": "VAR-201907-0229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "VULHUB", "id": "VHN-151226" } ], "trust": 1.14624132 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" } ] }, "last_update_date": "2023-12-18T13:23:40.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190703-asyncos-wsa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-asyncos-wsa" }, { "title": "CiscoWebSecurityApplianceAsyncOSSoftware enters a patch to verify the error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/167117" }, { "title": "Cisco Web Security Appliance AsyncOS Software Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=94416" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151226" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1884" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-asyncos-wsa" }, { "trust": 0.9, "url": "http://www.cisco.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1884" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-wsa-dos" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-denial-of-service-via-http-https-requests-29685" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2446/" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/109032" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "VULHUB", "id": "VHN-151226" }, { "db": "BID", "id": "109032" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "VULHUB", "id": "VHN-151226" }, { "db": "BID", "id": "109032" }, { "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "db": "NVD", "id": "CVE-2019-1884" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2019-21307" }, { "date": "2019-07-04T00:00:00", "db": "VULHUB", "id": "VHN-151226" }, { "date": "2019-07-03T00:00:00", "db": "BID", "id": "109032" }, { "date": "2019-07-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "date": "2019-07-04T20:15:10.937000", "db": "NVD", "id": "CVE-2019-1884" }, { "date": "2019-07-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2019-21307" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-151226" }, { "date": "2019-07-03T00:00:00", "db": "BID", "id": "109032" }, { "date": "2019-07-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006269" }, { "date": "2019-10-09T23:48:25.927000", "db": "NVD", "id": "CVE-2019-1884" }, { "date": "2019-07-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-227" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance AsyncOS Software Input Validation Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-21307" }, { "db": "CNNVD", "id": "CNNVD-201907-227" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-227" } ], "trust": 0.6 } }
var-201611-0171
Vulnerability from variot
A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCva13456. Known Affected Releases: 10.0.0-082 10.0.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131. The device provides spam protection, email encryption, and data loss prevention. CiscoEmailSecurityAppliance has a security bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCva13456
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0171", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-06" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "BID", "id": "94360" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-082:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.1-06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6462" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94360" } ], "trust": 0.3 }, "cve": "CVE-2016-6462", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-6462", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-11330", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-95282", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-6462", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6462", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-11330", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201611-444", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95282", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "VULHUB", "id": "VHN-95282" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCva13456. Known Affected Releases: 10.0.0-082 10.0.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131. The device provides spam protection, email encryption, and data loss prevention. CiscoEmailSecurityAppliance has a security bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCva13456 ", "sources": [ { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "BID", "id": "94360" }, { "db": "VULHUB", "id": "VHN-95282" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6462", "trust": 3.4 }, { "db": "BID", "id": "94360", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037307", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005913", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201611-444", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11330", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95282", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "VULHUB", "id": "VHN-95282" }, { "db": "BID", "id": "94360" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "id": "VAR-201611-0171", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "VULHUB", "id": "VHN-95282" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" } ] }, "last_update_date": "2023-12-18T13:44:11.602000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161116-esa1", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161116-esa1" }, { "title": "Patch for CiscoEmailSecurityAppliance Security Bypass Vulnerability (CNVD-2016-11330)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/84100" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Remote security bypass vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65783" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95282" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161116-esa1" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94360" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037307" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6462" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6462" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "VULHUB", "id": "VHN-95282" }, { "db": "BID", "id": "94360" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11330" }, { "db": "VULHUB", "id": "VHN-95282" }, { "db": "BID", "id": "94360" }, { "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "db": "NVD", "id": "CVE-2016-6462" }, { "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-11330" }, { "date": "2016-11-19T00:00:00", "db": "VULHUB", "id": "VHN-95282" }, { "date": "2016-11-16T00:00:00", "db": "BID", "id": "94360" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "date": "2016-11-19T03:03:05.587000", "db": "NVD", "id": "CVE-2016-6462" }, { "date": "2016-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-11330" }, { "date": "2017-07-28T00:00:00", "db": "VULHUB", "id": "VHN-95282" }, { "date": "2016-11-24T01:11:00", "db": "BID", "id": "94360" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005913" }, { "date": "2017-07-28T01:29:02.283000", "db": "NVD", "id": "CVE-2016-6462" }, { "date": "2016-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-444" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-444" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security For appliance AsyncOS Set in the email filtering function of AMP Vulnerabilities that bypass the filter", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005913" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-444" } ], "trust": 0.6 } }
var-201609-0316
Vulnerability from variot
Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017. Vendors have confirmed this vulnerability Bug ID CSCvb26017 It is released as.By connecting to a test / debug interface by a third party, root Access rights may be obtained. A permission acquisition vulnerability exists in Cisco IronPortAsyncOS for Cisco ESA. When the version before EnrollmentClient1.0.2-065 is installed, the remote attacker can use the vulnerability of the testing or debugging interface to obtain root privileges. An attacker may exploit this issue to gain root privileges on the affected device; this can also result in the attacker gaining complete control of the affected system. This issue is being tracked by Cisco Bug ID CSCvb26017
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.1.2-023" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.1.2-028" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.1.2-036" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.7.2-046" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 2.2, "vendor": "cisco", "version": "9.7.2-054" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.2-023" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.2-028" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.2-036" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.2-046" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.2-054" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security virtual appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7-2-054" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "BID", "id": "93116" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-036:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-046:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-124:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-023:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-028:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-047:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-054:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6406" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93116" } ], "trust": 0.3 }, "cve": "CVE-2016-6406", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-6406", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-08217", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-95226", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6406", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6406", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2016-08217", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201609-559", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-95226", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-6406", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULHUB", "id": "VHN-95226" }, { "db": "VULMON", "id": "CVE-2016-6406" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017. Vendors have confirmed this vulnerability Bug ID CSCvb26017 It is released as.By connecting to a test / debug interface by a third party, root Access rights may be obtained. A permission acquisition vulnerability exists in Cisco IronPortAsyncOS for Cisco ESA. When the version before EnrollmentClient1.0.2-065 is installed, the remote attacker can use the vulnerability of the testing or debugging interface to obtain root privileges. \nAn attacker may exploit this issue to gain root privileges on the affected device; this can also result in the attacker gaining complete control of the affected system. \nThis issue is being tracked by Cisco Bug ID CSCvb26017", "sources": [ { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "BID", "id": "93116" }, { "db": "VULHUB", "id": "VHN-95226" }, { "db": "VULMON", "id": "CVE-2016-6406" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6406", "trust": 3.5 }, { "db": "BID", "id": "93116", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036881", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-004894", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201609-559", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-08217", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95226", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6406", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULHUB", "id": "VHN-95226" }, { "db": "VULMON", "id": "CVE-2016-6406" }, { "db": "BID", "id": "93116" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "id": "VAR-201609-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULHUB", "id": "VHN-95226" } ], "trust": 1.2149158199999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" } ] }, "last_update_date": "2023-12-18T12:44:50.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160922-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160922-esa" }, { "title": "CiscoIronPortAsyncOSfor CiscoEmailSecurityAppliances Permission to Obtain Vulnerability Patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/81861" }, { "title": "Cisco IronPort AsyncOS for Cisco Email Security Appliances Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64288" }, { "title": "Cisco: Cisco Email Security Appliance Internal Testing Interface Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20160922-esa" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-warns-of-critical-flaw-in-email-security-appliances/120968/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULMON", "id": "CVE-2016-6406" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95226" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160922-esa" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/93116" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1036881" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6406" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6406" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-warns-of-critical-flaw-in-email-security-appliances/120968/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULHUB", "id": "VHN-95226" }, { "db": "VULMON", "id": "CVE-2016-6406" }, { "db": "BID", "id": "93116" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-08217" }, { "db": "VULHUB", "id": "VHN-95226" }, { "db": "VULMON", "id": "CVE-2016-6406" }, { "db": "BID", "id": "93116" }, { "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "db": "NVD", "id": "CVE-2016-6406" }, { "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-28T00:00:00", "db": "CNVD", "id": "CNVD-2016-08217" }, { "date": "2016-09-22T00:00:00", "db": "VULHUB", "id": "VHN-95226" }, { "date": "2016-09-22T00:00:00", "db": "VULMON", "id": "CVE-2016-6406" }, { "date": "2016-09-22T00:00:00", "db": "BID", "id": "93116" }, { "date": "2016-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "date": "2016-09-22T22:59:22.193000", "db": "NVD", "id": "CVE-2016-6406" }, { "date": "2016-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-28T00:00:00", "db": "CNVD", "id": "CNVD-2016-08217" }, { "date": "2017-07-30T00:00:00", "db": "VULHUB", "id": "VHN-95226" }, { "date": "2017-07-30T00:00:00", "db": "VULMON", "id": "CVE-2016-6406" }, { "date": "2016-09-23T00:01:00", "db": "BID", "id": "93116" }, { "date": "2016-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004894" }, { "date": "2017-07-30T01:29:12.100000", "db": "NVD", "id": "CVE-2016-6406" }, { "date": "2016-09-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-559" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-559" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Runs on the appliance device IronPort AsyncOS In root Vulnerability for which access rights are acquired", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-559" } ], "trust": 0.6 } }
var-201511-0007
Vulnerability from variot
The proxy-cache implementation in Cisco AsyncOS 8.0.x before 8.0.7-151, 8.1.x and 8.5.x before 8.5.2-004, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple proxy connections, aka Bug ID CSCus10922. The Cisco Web Security Appliance is a network security appliance from Cisco. A security vulnerability exists in the proxy cache feature of Cisco AsyncOS in Cisco WSA appliances. The program failed to handle the memory correctly. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCus10922. The following releases are affected: Cisco AsyncOS 8.0.x prior to 8.0.7-151, 8.1.x and 8.5.x prior to 8.5.2-004, 8.6.x and 8.7.x prior to 8.7.0-171-LD Version, 8.8.x version before 8.8.0-085
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0007", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "8.0.5" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "8.0.6" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.6-119" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.7.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.7.0-171-ld" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.0.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1.x" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.5.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.2-004" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.8.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.7-151" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.1.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.7.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.8.x(\u003c8.8.0-085)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.0.x(\u003c8.0.7-151)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5.x(\u003c8.5.2-004)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.7" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.6-115" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.6-078" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.6-073" }, { "model": "web security appliance hot patch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.51" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "web security appliance 8.7.0-171-ld", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.2-004" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.7-151" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "BID", "id": "77437" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6292" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "77437" } ], "trust": 0.3 }, "cve": "CVE-2015-6292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6292", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-07470", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84253", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6292", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-07470", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-105", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84253", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "VULHUB", "id": "VHN-84253" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The proxy-cache implementation in Cisco AsyncOS 8.0.x before 8.0.7-151, 8.1.x and 8.5.x before 8.5.2-004, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple proxy connections, aka Bug ID CSCus10922. The Cisco Web Security Appliance is a network security appliance from Cisco. A security vulnerability exists in the proxy cache feature of Cisco AsyncOS in Cisco WSA appliances. The program failed to handle the memory correctly. \nAttackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCus10922. The following releases are affected: Cisco AsyncOS 8.0.x prior to 8.0.7-151, 8.1.x and 8.5.x prior to 8.5.2-004, 8.6.x and 8.7.x prior to 8.7.0-171-LD Version, 8.8.x version before 8.8.0-085", "sources": [ { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "BID", "id": "77437" }, { "db": "VULHUB", "id": "VHN-84253" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6292", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034062", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-105", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07470", "trust": 0.6 }, { "db": "BID", "id": "77437", "trust": 0.4 }, { "db": "SEEBUG", "id": "SSVID-89769", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-84253", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "VULHUB", "id": "VHN-84253" }, { "db": "BID", "id": "77437" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "id": "VAR-201511-0007", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "VULHUB", "id": "VHN-84253" } ], "trust": 1.14624132 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" } ] }, "last_update_date": "2023-12-18T12:57:41.110000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151104-wsa1", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa1" }, { "title": "Patch for Cisco Web Security Appliance Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/66503" }, { "title": "Cisco Email Security Appliance AsyncOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58600" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84253" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa1" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034062" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6292" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6292" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps10164/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "VULHUB", "id": "VHN-84253" }, { "db": "BID", "id": "77437" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07470" }, { "db": "VULHUB", "id": "VHN-84253" }, { "db": "BID", "id": "77437" }, { "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "db": "NVD", "id": "CVE-2015-6292" }, { "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07470" }, { "date": "2015-11-06T00:00:00", "db": "VULHUB", "id": "VHN-84253" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77437" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "date": "2015-11-06T11:59:02.807000", "db": "NVD", "id": "CVE-2015-6292" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07470" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84253" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77437" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005766" }, { "date": "2016-12-07T18:19:20.843000", "db": "NVD", "id": "CVE-2015-6292" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-105" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-105" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Service disruption in the implementation of proxy caches (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-105" } ], "trust": 0.6 } }
var-201605-0558
Vulnerability from variot
Memory leak in Cisco AsyncOS through 8.8 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an unspecified HTTP status code, aka Bug ID CSCur28305. Cisco AsyncOS for Cisco Web Security Appliance is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCur28305. The vulnerability is caused by not releasing the connection memory and system file descriptors of the client and server when the program receives a specific HTTP response code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0558", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1-021" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-825" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.8-mr-113" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.3-055" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.1" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.0" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.1-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.4" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.6.0-623" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.2" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.7-142" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-027" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.7" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-024" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.5" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-078" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-119" }, { "model": "web security the appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "8.8" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3-010" } ], "sources": [ { "db": "BID", "id": "90744" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):6.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):5.6.0-623:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.2-027:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.1-021:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.7-142:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.8-mr-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.2-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.0-825:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6-078:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.3-055:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6-119:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.2-024:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1383" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "90744" } ], "trust": 0.3 }, "cve": "CVE-2016-1383", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1383", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90202", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1383", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1383", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-462", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90202", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-90202" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in Cisco AsyncOS through 8.8 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an unspecified HTTP status code, aka Bug ID CSCur28305. Cisco AsyncOS for Cisco Web Security Appliance is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCur28305. The vulnerability is caused by not releasing the connection memory and system file descriptors of the client and server when the program receives a specific HTTP response code", "sources": [ { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "BID", "id": "90744" }, { "db": "VULHUB", "id": "VHN-90202" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1383", "trust": 2.8 }, { "db": "SECTRACK", "id": "1035911", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002924", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-462", "trust": 0.7 }, { "db": "BID", "id": "90744", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-90202", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90202" }, { "db": "BID", "id": "90744" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "id": "VAR-201605-0558", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-90202" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T12:20:30.133000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160518-wsa4", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa4" }, { "title": "Cisco Web Security Appliance AsyncOS Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61776" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90202" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa4" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035911" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1383" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1383" }, { "trust": 0.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa4/" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90202" }, { "db": "BID", "id": "90744" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-90202" }, { "db": "BID", "id": "90744" }, { "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "db": "NVD", "id": "CVE-2016-1383" }, { "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-25T00:00:00", "db": "VULHUB", "id": "VHN-90202" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90744" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "date": "2016-05-25T01:59:07.177000", "db": "NVD", "id": "CVE-2016-1383" }, { "date": "2016-05-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-01T00:00:00", "db": "VULHUB", "id": "VHN-90202" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90744" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002924" }, { "date": "2016-12-01T03:05:27.040000", "db": "NVD", "id": "CVE-2016-1383" }, { "date": "2016-05-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-462" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002924" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-462" } ], "trust": 0.6 } }
var-201612-0374
Vulnerability from variot
A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074. WebSecurityAppliance (WSA) is a product of Cisco Systems Inc., which is a network security device. There is a remote security bypass vulnerability in WebSecurityAppliance. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions that may be helpful in further attacks. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCvb49012. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. An attacker could exploit this vulnerability by sending a specially crafted HTTP request to access a prohibited website
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0374", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.1-074" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.1-162" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0.1-162" }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-074" }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance all", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "BID", "id": "94774" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-9212" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94774" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ], "trust": 0.9 }, "cve": "CVE-2016-9212", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-9212", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-12243", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-98032", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-9212", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-9212", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-12243", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-203", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-98032", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "VULHUB", "id": "VHN-98032" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Decrypt for End-User Notification configuration parameter of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to connect to a secure website over Secure Sockets Layer (SSL) or Transport Layer Security (TLS), even if the WSA is configured to block connections to the website. Affected Products: This vulnerability affects Cisco Web Security Appliances if the HTTPS decryption options are enabled and configured for the device to block connections to certain websites. More Information: CSCvb49012. Known Affected Releases: 9.0.1-162 9.1.1-074. WebSecurityAppliance (WSA) is a product of Cisco Systems Inc., which is a network security device. There is a remote security bypass vulnerability in WebSecurityAppliance. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions that may be helpful in further attacks. This may aid in further attacks. \nThis issue is tracked by Cisco Bug ID CSCvb49012. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. An attacker could exploit this vulnerability by sending a specially crafted HTTP request to access a prohibited website", "sources": [ { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "BID", "id": "94774" }, { "db": "VULHUB", "id": "VHN-98032" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9212", "trust": 3.4 }, { "db": "BID", "id": "94774", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037410", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-006308", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-203", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-12243", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-98032", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "VULHUB", "id": "VHN-98032" }, { "db": "BID", "id": "94774" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "id": "VAR-201612-0374", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "VULHUB", "id": "VHN-98032" } ], "trust": 1.29216826 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" } ] }, "last_update_date": "2023-12-18T12:51:28.782000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161207-wsa1", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-wsa1" }, { "title": "Cisco Web Security Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66244" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98032" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-wsa1" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94774" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037410" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9212" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9212" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-wsa" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "VULHUB", "id": "VHN-98032" }, { "db": "BID", "id": "94774" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-12243" }, { "db": "VULHUB", "id": "VHN-98032" }, { "db": "BID", "id": "94774" }, { "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "db": "NVD", "id": "CVE-2016-9212" }, { "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2016-12243" }, { "date": "2016-12-14T00:00:00", "db": "VULHUB", "id": "VHN-98032" }, { "date": "2016-12-07T00:00:00", "db": "BID", "id": "94774" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "date": "2016-12-14T00:59:34.303000", "db": "NVD", "id": "CVE-2016-9212" }, { "date": "2016-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2016-12243" }, { "date": "2016-12-22T00:00:00", "db": "VULHUB", "id": "VHN-98032" }, { "date": "2016-12-20T01:08:00", "db": "BID", "id": "94774" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006308" }, { "date": "2016-12-22T21:12:08.837000", "db": "NVD", "id": "CVE-2016-9212" }, { "date": "2016-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-203" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-203" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security For appliance AsyncOS of End-User Notification Vulnerability that prevents block setting in configuration parameters", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006308" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-203" } ], "trust": 0.6 } }
var-201808-0311
Vulnerability from variot
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610. Vendors report this vulnerability Bug ID CSCvf36610 Published as.Denial of service (DoS) May be in a state. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users. AsyncOS Software is a set of operating systems running on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0311", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "9.1.2-022" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "9.1.2-010" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "11.0.0-641" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "10.5.1-270" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "10.1.1-235" }, { "model": "web security appliance", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "10.1.0-204" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.5.2-042" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.2-039" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.1-074" }, { "model": "web security appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "10.1" }, { "model": "asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "10.5" }, { "model": "asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "11.0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1-270" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1.1-235" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1.0-204" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-042" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-072" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.1.3-054" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.0-614" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-061" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "BID", "id": "105098" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.0.0-641:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.2-010:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.1.1-235:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.1-296:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.2-022:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.1.0-204:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.1-270:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.2-039:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0410" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "105098" } ], "trust": 0.3 }, "cve": "CVE-2018-0410", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0410", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2018-15418", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-118612", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0410", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0410", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-15418", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201808-461", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118612", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "VULHUB", "id": "VHN-118612" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610. Vendors report this vulnerability Bug ID CSCvf36610 Published as.Denial of service (DoS) May be in a state. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. \nAttackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users. AsyncOS Software is a set of operating systems running on it", "sources": [ { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "BID", "id": "105098" }, { "db": "VULHUB", "id": "VHN-118612" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0410", "trust": 3.4 }, { "db": "BID", "id": "105098", "trust": 2.0 }, { "db": "SECTRACK", "id": "1041535", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-009198", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201808-461", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-15418", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118612", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "VULHUB", "id": "VHN-118612" }, { "db": "BID", "id": "105098" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "id": "VAR-201808-0311", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "VULHUB", "id": "VHN-118612" } ], "trust": 1.29216826 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" } ] }, "last_update_date": "2023-12-18T13:13:45.938000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180815-wsa-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180815-wsa-dos" }, { "title": "CiscoWebSecurityApplianceWebProxy Memory Exhaustion Denial of Service Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/137511" }, { "title": "Cisco Web Security Appliances AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=83761" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118612" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180815-wsa-dos" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105098" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1041535" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0410" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0410" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "VULHUB", "id": "VHN-118612" }, { "db": "BID", "id": "105098" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-15418" }, { "db": "VULHUB", "id": "VHN-118612" }, { "db": "BID", "id": "105098" }, { "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "db": "NVD", "id": "CVE-2018-0410" }, { "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-16T00:00:00", "db": "CNVD", "id": "CNVD-2018-15418" }, { "date": "2018-08-15T00:00:00", "db": "VULHUB", "id": "VHN-118612" }, { "date": "2018-08-15T00:00:00", "db": "BID", "id": "105098" }, { "date": "2018-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "date": "2018-08-15T20:29:00.657000", "db": "NVD", "id": "CVE-2018-0410" }, { "date": "2018-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-16T00:00:00", "db": "CNVD", "id": "CNVD-2018-15418" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118612" }, { "date": "2018-08-15T00:00:00", "db": "BID", "id": "105098" }, { "date": "2018-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009198" }, { "date": "2019-10-09T23:32:00.897000", "db": "NVD", "id": "CVE-2018-0410" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-461" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliances of AsyncOS Vulnerability related to resource depletion in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-461" } ], "trust": 0.6 } }
var-201803-1402
Vulnerability from variot
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281. Vendors have confirmed this vulnerability Bug ID CSCvf74281 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco WebSecurity Appliance (WSA) is designed to help organizations address the growing challenges of protecting and controlling network traffic, making it easier and faster to deploy while reducing maintenance requirements, latency, and operational costs. An attacker can exploit this issue to bypass authentication mechanism and perform unauthorized actions. This may lead to further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS is an operating system that runs on it. FTP server is one of the FTP servers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1402", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "10.5.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-034" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "BID", "id": "103407" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:10.5.1-296:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0087" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "103407" } ], "trust": 0.3 }, "cve": "CVE-2018-0087", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-0087", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2018-06716", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-118289", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-0087", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0087", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-06716", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201803-264", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-118289", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "VULHUB", "id": "VHN-118289" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281. Vendors have confirmed this vulnerability Bug ID CSCvf74281 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco WebSecurity Appliance (WSA) is designed to help organizations address the growing challenges of protecting and controlling network traffic, making it easier and faster to deploy while reducing maintenance requirements, latency, and operational costs. \nAn attacker can exploit this issue to bypass authentication mechanism and perform unauthorized actions. This may lead to further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS is an operating system that runs on it. FTP server is one of the FTP servers", "sources": [ { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "BID", "id": "103407" }, { "db": "VULHUB", "id": "VHN-118289" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0087", "trust": 3.4 }, { "db": "BID", "id": "103407", "trust": 2.0 }, { "db": "SECTRACK", "id": "1040464", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-002690", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-264", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-06716", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118289", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "VULHUB", "id": "VHN-118289" }, { "db": "BID", "id": "103407" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "id": "VAR-201803-1402", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "VULHUB", "id": "VHN-118289" } ], "trust": 1.14624132 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" } ] }, "last_update_date": "2023-12-18T13:43:48.210000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180307-wsa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180307-wsa" }, { "title": "CiscoWebSecurityApplianceFTP authentication bypasses the patch for the vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/124331" }, { "title": "Cisco Web Security Appliance FTP Server security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78997" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 }, { "problemtype": "CWE-254", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118289" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180307-wsa" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/103407" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1040464" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0087" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0087" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "VULHUB", "id": "VHN-118289" }, { "db": "BID", "id": "103407" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-06716" }, { "db": "VULHUB", "id": "VHN-118289" }, { "db": "BID", "id": "103407" }, { "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "db": "NVD", "id": "CVE-2018-0087" }, { "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2018-06716" }, { "date": "2018-03-08T00:00:00", "db": "VULHUB", "id": "VHN-118289" }, { "date": "2018-03-07T00:00:00", "db": "BID", "id": "103407" }, { "date": "2018-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "date": "2018-03-08T07:29:00.223000", "db": "NVD", "id": "CVE-2018-0087" }, { "date": "2018-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2018-06716" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118289" }, { "date": "2018-03-07T00:00:00", "db": "BID", "id": "103407" }, { "date": "2018-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002690" }, { "date": "2019-10-09T23:31:12.223000", "db": "NVD", "id": "CVE-2018-0087" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-264" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-264" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance Vulnerabilities related to security functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002690" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-264" } ], "trust": 0.6 } }
var-201709-0681
Vulnerability from variot
A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533. Vendors have confirmed this vulnerability Bug ID CSCuz81533 It is released as.Information may be tampered with. AsyncOSSoftware is the operating system used in it. AdvancedMalwareProtection (AMP) is one of the advanced malware protection components. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0681", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "asyncos software", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "8.5.5-280" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.0-264" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "BID", "id": "100681" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12218" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "100681" } ], "trust": 0.3 }, "cve": "CVE-2017-12218", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12218", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-32477", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-102718", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12218", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12218", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-32477", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201709-229", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-102718", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "VULHUB", "id": "VHN-102718" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533. Vendors have confirmed this vulnerability Bug ID CSCuz81533 It is released as.Information may be tampered with. AsyncOSSoftware is the operating system used in it. AdvancedMalwareProtection (AMP) is one of the advanced malware protection components. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "BID", "id": "100681" }, { "db": "VULHUB", "id": "VHN-102718" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12218", "trust": 3.4 }, { "db": "BID", "id": "100681", "trust": 2.6 }, { "db": "SECTRACK", "id": "1039288", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-007984", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-229", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-32477", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-102718", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "VULHUB", "id": "VHN-102718" }, { "db": "BID", "id": "100681" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "id": "VAR-201709-0681", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "VULHUB", "id": "VHN-102718" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" } ] }, "last_update_date": "2023-12-18T13:43:58.859000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170906-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170906-esa" }, { "title": "CiscoAsyncOSSoftware Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/104403" }, { "title": "Cisco Email Security Appliances Advanced Malware Protection Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74583" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102718" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/100681" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170906-esa" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039288" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12218" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12218" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "VULHUB", "id": "VHN-102718" }, { "db": "BID", "id": "100681" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-32477" }, { "db": "VULHUB", "id": "VHN-102718" }, { "db": "BID", "id": "100681" }, { "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "db": "NVD", "id": "CVE-2017-12218" }, { "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2017-32477" }, { "date": "2017-09-07T00:00:00", "db": "VULHUB", "id": "VHN-102718" }, { "date": "2017-09-06T00:00:00", "db": "BID", "id": "100681" }, { "date": "2017-10-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "date": "2017-09-07T21:29:00.410000", "db": "NVD", "id": "CVE-2017-12218" }, { "date": "2017-09-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2017-32477" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-102718" }, { "date": "2017-09-06T00:00:00", "db": "BID", "id": "100681" }, { "date": "2017-10-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007984" }, { "date": "2019-10-09T23:22:29.870000", "db": "NVD", "id": "CVE-2017-12218" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-229" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-229" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance for AsyncOS Software input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007984" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-229" } ], "trust": 0.6 } }
var-201306-0168
Vulnerability from variot
The management GUI in the web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-602; Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (system hang) via a series of (1) HTTP or (2) HTTPS requests to a management interface, aka Bug IDs CSCzv58669, CSCzv63329, and CSCzv78669. Vendors have confirmed this vulnerability Bug ID CSCzv58669 , CSCzv63329 ,and CSCzv78669 It is released as.To a management interface by a third party (1) HTTP Or (2) HTTPS Service disruption through a series of requests ( System hang ) There is a possibility of being put into a state. Multiple Cisco products are prone to a remote denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions. This issue being tracked by Cisco bug IDs CSCzv63329, CSCzv58669, and CSCzv78669. Content SMA is a set of content security management equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0168", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.8" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.3" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.9" }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*3)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.7.0-602" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.0-404" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.0-838" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.3 (*1)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.6 (*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.3-013" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.5 (*3)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.7 (*3)" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.9.1-102" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.6.3-019" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.0 (*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.5-106" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5 (*1)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*1)" }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1.3" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3385" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "60807" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ], "trust": 0.9 }, "cve": "CVE-2013-3385", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-3385", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-63387", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3385", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-504", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63387", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63387" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The management GUI in the web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-602; Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (system hang) via a series of (1) HTTP or (2) HTTPS requests to a management interface, aka Bug IDs CSCzv58669, CSCzv63329, and CSCzv78669. Vendors have confirmed this vulnerability Bug ID CSCzv58669 , CSCzv63329 ,and CSCzv78669 It is released as.To a management interface by a third party (1) HTTP Or (2) HTTPS Service disruption through a series of requests ( System hang ) There is a possibility of being put into a state. Multiple Cisco products are prone to a remote denial-of-service vulnerability. \nSuccessfully exploiting this issue allows remote attackers to cause denial-of-service conditions. \nThis issue being tracked by Cisco bug IDs CSCzv63329, CSCzv58669, and CSCzv78669. Content SMA is a set of content security management equipment", "sources": [ { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "BID", "id": "60807" }, { "db": "VULHUB", "id": "VHN-63387" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3385", "trust": 2.8 }, { "db": "BID", "id": "60807", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-504", "trust": 0.7 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO EMAIL SECURITY APPLIANCE", "trust": 0.6 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO WEB SECURITY APPLIANCE", "trust": 0.6 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO CONTENT SECURITY MANAGEMENT APPLIANCE", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63387", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63387" }, { "db": "BID", "id": "60807" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "id": "VAR-201306-0168", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63387" } ], "trust": 0.6588235 }, "last_update_date": "2023-12-18T13:09:31.312000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "29452", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=29452" }, { "title": "cisco-sa-20130626-wsa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "title": "29728", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29728" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118426_cisco-sa-20130626-sma-j.html" }, { "title": "cisco-sa-20130626-wsa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118424_cisco-sa-20130626-wsa-j.html" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118427_cisco-sa-20130626-esa-j.html" }, { "title": "Cisco AsyncOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186288" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63387" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3385" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3385" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60807" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29728" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63387" }, { "db": "BID", "id": "60807" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63387" }, { "db": "BID", "id": "60807" }, { "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "db": "NVD", "id": "CVE-2013-3385" }, { "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-27T00:00:00", "db": "VULHUB", "id": "VHN-63387" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60807" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "date": "2013-06-27T21:55:07.057000", "db": "NVD", "id": "CVE-2013-3385" }, { "date": "2013-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-63387" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60807" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003154" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2013-3385" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-504" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-504" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security Runs on the appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003154" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-504" } ], "trust": 0.6 } }
var-201608-0238
Vulnerability from variot
Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuz14932
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lte", "trust": 1.8, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "9.6.0-051" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "7.6.3-025" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "7.5.2-201" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "8.0.1-023" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "9.1.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisca", "version": "7.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "BID", "id": "92155" }, { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.7.0-125", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1461" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "92155" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ], "trust": 0.9 }, "cve": "CVE-2016-1461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-1461", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-1461", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1461", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201607-1032", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCuz14932", "sources": [ { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "BID", "id": "92155" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1461", "trust": 2.7 }, { "db": "BID", "id": "92155", "trust": 1.9 }, { "db": "SECTRACK", "id": "1036470", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2016-004106", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201607-1032", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "92155" }, { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "id": "VAR-201608-0238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43892258 }, "last_update_date": "2023-12-18T13:24:37.454000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160727-esa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160727-esa" }, { "title": "Cisco AsyncOS on Email Security Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91633" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160727-esa" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/92155" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1036470" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1461" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1461" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "BID", "id": "92155" }, { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "92155" }, { "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "db": "NVD", "id": "CVE-2016-1461" }, { "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-27T00:00:00", "db": "BID", "id": "92155" }, { "date": "2016-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "date": "2016-08-01T02:59:00.167000", "db": "NVD", "id": "CVE-2016-1461" }, { "date": "2016-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-27T00:00:00", "db": "BID", "id": "92155" }, { "date": "2016-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004106" }, { "date": "2022-02-01T18:11:47.073000", "db": "NVD", "id": "CVE-2016-1461" }, { "date": "2022-02-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-1032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201607-1032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security The appliance Run on device AsyncOS Vulnerabilities that prevent malware detection", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004106" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201607-1032" } ], "trust": 0.6 } }
var-201306-0166
Vulnerability from variot
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294. Successfully exploiting this issue may allow an attacker to execute arbitrary commands with elevated privileges in context of the affected application. This issue being tracked by Cisco bug ID CSCzv69294. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. This vulnerability stems from the failure to correctly filter the special URL submitted by the user
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0166", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5" }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.7.0-550" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.7" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.0-838" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1.3" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3383" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "60804" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ], "trust": 0.9 }, "cve": "CVE-2013-3383", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-3383", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-63385", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3383", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-501", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-63385", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63385" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary commands with elevated privileges in context of the affected application. \nThis issue being tracked by Cisco bug ID CSCzv69294. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. This vulnerability stems from the failure to correctly filter the special URL submitted by the user", "sources": [ { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "BID", "id": "60804" }, { "db": "VULHUB", "id": "VHN-63385" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3383", "trust": 2.8 }, { "db": "BID", "id": "60804", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003152", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-501", "trust": 0.7 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO WEB SECURITY APPLIANCE", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63385", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63385" }, { "db": "BID", "id": "60804" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "id": "VAR-201306-0166", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63385" } ], "trust": 0.6588235 }, "last_update_date": "2023-12-18T13:09:31.340000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "29452", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=29452" }, { "title": "cisco-sa-20130626-wsa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "title": "29746", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29746" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118426_cisco-sa-20130626-sma-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63385" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3383" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3383" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60804" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63385" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63385" }, { "db": "BID", "id": "60804" }, { "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "db": "NVD", "id": "CVE-2013-3383" }, { "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-27T00:00:00", "db": "VULHUB", "id": "VHN-63385" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60804" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "date": "2013-06-27T21:55:06.987000", "db": "NVD", "id": "CVE-2013-3383" }, { "date": "2013-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-28T00:00:00", "db": "VULHUB", "id": "VHN-63385" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60804" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003152" }, { "date": "2013-06-28T04:00:00", "db": "NVD", "id": "CVE-2013-3383" }, { "date": "2013-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-501" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-501" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Vulnerable to arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003152" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-501" } ], "trust": 0.6 } }
var-201306-0169
Vulnerability from variot
The IronPort Spam Quarantine (ISQ) component in the web framework in IronPort AsyncOS on Cisco Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019 and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (service crash or hang) via a high rate of TCP connection attempts, aka Bug IDs CSCzv25573 and CSCzv81712. Vendors have confirmed this vulnerability Bug ID CSCzv25573 ,and CSCzv81712 It is released as.By a third party, TCP Service disruption through connection attempt ( Service crash or hang ) There is a possibility of being put into a state. Multiple Cisco products is prone to a denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCzv25573 and CSCzv81712
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.3" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.9" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0" }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.1.5" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.0 (*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.6.3-019" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.5-106" }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5 (*1)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.3 (*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.9.1-102" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.0-404" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*1)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.6 (*1)" }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.4" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.9.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.9" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.2" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.3-019" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-106" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.0-404" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.9.1-102" } ], "sources": [ { "db": "BID", "id": "60806" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3386" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "60806" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ], "trust": 0.9 }, "cve": "CVE-2013-3386", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-3386", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-63388", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3386", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-503", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63388", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63388" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IronPort Spam Quarantine (ISQ) component in the web framework in IronPort AsyncOS on Cisco Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019 and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (service crash or hang) via a high rate of TCP connection attempts, aka Bug IDs CSCzv25573 and CSCzv81712. Vendors have confirmed this vulnerability Bug ID CSCzv25573 ,and CSCzv81712 It is released as.By a third party, TCP Service disruption through connection attempt ( Service crash or hang ) There is a possibility of being put into a state. Multiple Cisco products is prone to a denial-of-service vulnerability. \nSuccessfully exploiting this issue allows remote attackers to cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCzv25573 and CSCzv81712", "sources": [ { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "BID", "id": "60806" }, { "db": "VULHUB", "id": "VHN-63388" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3386", "trust": 2.8 }, { "db": "BID", "id": "60806", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003155", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-503", "trust": 0.7 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO CONTENT SECURITY MANAGEMENT APPLIANCE", "trust": 0.6 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO EMAIL SECURITY APPLIANCE", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63388", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63388" }, { "db": "BID", "id": "60806" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "id": "VAR-201306-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63388" } ], "trust": 0.59887304 }, "last_update_date": "2023-12-18T13:09:31.397000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "29452", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=29452" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "title": "29727", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29727" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118426_cisco-sa-20130626-sma-j.html" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118427_cisco-sa-20130626-esa-j.html" }, { "title": "Cisco AsyncOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186287" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63388" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3386" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3386" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60806" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63388" }, { "db": "BID", "id": "60806" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63388" }, { "db": "BID", "id": "60806" }, { "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "db": "NVD", "id": "CVE-2013-3386" }, { "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-27T00:00:00", "db": "VULHUB", "id": "VHN-63388" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60806" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "date": "2013-06-27T21:55:07.090000", "db": "NVD", "id": "CVE-2013-3386" }, { "date": "2013-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-63388" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60806" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003155" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2013-3386" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-503" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-503" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance and content Runs on a Security Management appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003155" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-503" } ], "trust": 0.6 } }
var-201511-0008
Vulnerability from variot
Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple file-range requests, aka Bug ID CSCur39155. Vendors have confirmed this vulnerability Bug ID CSCur39155 It is released as.Multiple third parties file-range Service disruption via request ( Memory consumption ) There is a possibility of being put into a state. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug IDs CSCur39155 and CSCuu29304. The following releases are affected: Cisco AsyncOS 8.x prior to 8.0.8-113, 8.1.x and 8.5.x prior to 8.5.3-051, 8.6.x and 8.7.x prior to 8.7.0-171-LD Version, 8.8.x version before 8.8.0-085
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0008", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.6" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.8-mr-113" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.6-078" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.2-024" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.5" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.7-142" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.7.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.3-051" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.7.0-171-ld" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.5.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1.x" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.8.x" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.8-113" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.x(\u003c8.0.8-113)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.1.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5.x(\u003c8.5.3-051)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.6.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.7.x" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.8.x(\u003c8.8.0-085)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "asyncos 8.7.0-171-ld", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.3-051" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.8-113" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "BID", "id": "77438" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6293" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "77438" } ], "trust": 0.3 }, "cve": "CVE-2015-6293", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6293", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-07405", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84254", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6293", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-07405", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-101", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84254", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-6293", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULHUB", "id": "VHN-84254" }, { "db": "VULMON", "id": "CVE-2015-6293" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple file-range requests, aka Bug ID CSCur39155. Vendors have confirmed this vulnerability Bug ID CSCur39155 It is released as.Multiple third parties file-range Service disruption via request ( Memory consumption ) There is a possibility of being put into a state. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug IDs CSCur39155 and CSCuu29304. The following releases are affected: Cisco AsyncOS 8.x prior to 8.0.8-113, 8.1.x and 8.5.x prior to 8.5.3-051, 8.6.x and 8.7.x prior to 8.7.0-171-LD Version, 8.8.x version before 8.8.0-085", "sources": [ { "db": "NVD", "id": "CVE-2015-6293" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "BID", "id": "77438" }, { "db": "VULHUB", "id": "VHN-84254" }, { "db": "VULMON", "id": "CVE-2015-6293" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6293", "trust": 3.5 }, { "db": "SECTRACK", "id": "1034063", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2015-005767", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-101", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07405", "trust": 0.6 }, { "db": "BID", "id": "77438", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-84254", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-6293", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULHUB", "id": "VHN-84254" }, { "db": "VULMON", "id": "CVE-2015-6293" }, { "db": "BID", "id": "77438" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "id": "VAR-201511-0008", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULHUB", "id": "VHN-84254" } ], "trust": 1.14624132 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" } ] }, "last_update_date": "2024-02-13T23:02:55.713000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151104-wsa2", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa2" }, { "title": "Patch for Cisco AsyncOS Denial of Service Vulnerability (CNVD-2015-07405)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/66477" }, { "title": "Cisco Web Security Appliance AsyncOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58597" }, { "title": "Cisco: Cisco Web Security Appliance Range Request Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20151104-wsa2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULMON", "id": "CVE-2015-6293" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84254" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-wsa2" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1034063" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6293" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6293" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULHUB", "id": "VHN-84254" }, { "db": "VULMON", "id": "CVE-2015-6293" }, { "db": "BID", "id": "77438" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07405" }, { "db": "VULHUB", "id": "VHN-84254" }, { "db": "VULMON", "id": "CVE-2015-6293" }, { "db": "BID", "id": "77438" }, { "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "db": "CNNVD", "id": "CNNVD-201511-101" }, { "db": "NVD", "id": "CVE-2015-6293" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07405" }, { "date": "2015-11-06T00:00:00", "db": "VULHUB", "id": "VHN-84254" }, { "date": "2015-11-06T00:00:00", "db": "VULMON", "id": "CVE-2015-6293" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77438" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-101" }, { "date": "2015-11-06T03:59:02.497000", "db": "NVD", "id": "CVE-2015-6293" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07405" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84254" }, { "date": "2016-12-07T00:00:00", "db": "VULMON", "id": "CVE-2015-6293" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77438" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005767" }, { "date": "2015-11-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-101" }, { "date": "2016-12-07T18:19:22.030000", "db": "NVD", "id": "CVE-2015-6293" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-101" } ], "trust": 0.6 } }
var-201611-0172
Vulnerability from variot
A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuz85823. Known Affected Releases: 10.0.0-082 9.7.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. Cisco AsyncOS has a security bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. This issue is being tracked by Cisco Bug ID CSCuz85823
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-06" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-082" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "BID", "id": "94363" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.1-06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-082:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6463" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94363" } ], "trust": 0.3 }, "cve": "CVE-2016-6463", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-6463", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-11335", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-95283", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-6463", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6463", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-11335", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201611-443", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95283", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "VULHUB", "id": "VHN-95283" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuz85823. Known Affected Releases: 10.0.0-082 9.7.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. Cisco AsyncOS has a security bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. \nThis issue is being tracked by Cisco Bug ID CSCuz85823", "sources": [ { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "BID", "id": "94363" }, { "db": "VULHUB", "id": "VHN-95283" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6463", "trust": 3.4 }, { "db": "BID", "id": "94363", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-005914", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201611-443", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11335", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95283", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "VULHUB", "id": "VHN-95283" }, { "db": "BID", "id": "94363" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "id": "VAR-201611-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "VULHUB", "id": "VHN-95283" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" } ] }, "last_update_date": "2023-12-18T13:34:21.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161116-esa2", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161116-esa2" }, { "title": "CiscoAsyncOS Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/84106" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65782" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95283" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161116-esa2" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94363" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6463" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6463" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "VULHUB", "id": "VHN-95283" }, { "db": "BID", "id": "94363" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11335" }, { "db": "VULHUB", "id": "VHN-95283" }, { "db": "BID", "id": "94363" }, { "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "db": "NVD", "id": "CVE-2016-6463" }, { "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-11335" }, { "date": "2016-11-19T00:00:00", "db": "VULHUB", "id": "VHN-95283" }, { "date": "2016-11-16T00:00:00", "db": "BID", "id": "94363" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "date": "2016-11-19T03:03:06.743000", "db": "NVD", "id": "CVE-2016-6463" }, { "date": "2016-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-11335" }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-95283" }, { "date": "2016-11-24T01:11:00", "db": "BID", "id": "94363" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005914" }, { "date": "2016-11-28T20:33:13.827000", "db": "NVD", "id": "CVE-2016-6463" }, { "date": "2016-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-443" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security For appliance AsyncOS Set in the email filtering function of AMP Vulnerabilities that bypass the filter", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005914" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-443" } ], "trust": 0.6 } }
var-201306-0167
Vulnerability from variot
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579. Vendors have confirmed this vulnerability Bug ID CSCzv85726 , CSCzv44633 ,and CSCzv24579 It is released as.By a remotely authenticated user URL An arbitrary command may be executed via a crafted command line input in the. Multiple Cisco products are prone to a remote command-injection vulnerability because they fail to properly sanitize user-supplied input. Successfully exploiting this issue may allow an attacker to execute arbitrary commands with elevated privileges in context of the affected application. This issue being tracked by Cisco bug IDs CSCzv44633, CSCzv85726, and CSCzv24579. ESA is an email security appliance. Content SMA is a set of content security management equipment. A command injection vulnerability exists in the web framework in IronPort AsyncOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0167", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.8" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.3" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.9" }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*3)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.2-203" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.5-104" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.5 (*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.2.2-110" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.9 (*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.0-838" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.6 (*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.3-013" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.5 (*3)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.7 (*3)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.7.0-550" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.7 (*2)" }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.9.1-102" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.3.2-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.8 (*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.6.3-019" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.3 (*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.7.0-213" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*1)" }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1.3" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.4" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.2" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.4" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.9.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.9" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.2" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.7.0-550" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.3-019" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.9.1-102" } ], "sources": [ { "db": "BID", "id": "60805" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3384" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "60805" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ], "trust": 0.9 }, "cve": "CVE-2013-3384", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-3384", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-63386", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3384", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-502", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-63386", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63386" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579. Vendors have confirmed this vulnerability Bug ID CSCzv85726 , CSCzv44633 ,and CSCzv24579 It is released as.By a remotely authenticated user URL An arbitrary command may be executed via a crafted command line input in the. Multiple Cisco products are prone to a remote command-injection vulnerability because they fail to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary commands with elevated privileges in context of the affected application. \nThis issue being tracked by Cisco bug IDs CSCzv44633, CSCzv85726, and CSCzv24579. ESA is an email security appliance. Content SMA is a set of content security management equipment. A command injection vulnerability exists in the web framework in IronPort AsyncOS", "sources": [ { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "BID", "id": "60805" }, { "db": "VULHUB", "id": "VHN-63386" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3384", "trust": 2.8 }, { "db": "BID", "id": "60805", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003153", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-502", "trust": 0.7 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO EMAIL SECURITY APPLIANCE", "trust": 0.6 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO WEB SECURITY APPLIANCE", "trust": 0.6 }, { "db": "CISCO", "id": "20130626 MULTIPLE VULNERABILITIES IN CISCO CONTENT SECURITY MANAGEMENT APPLIANCE", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-60868", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-63386", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63386" }, { "db": "BID", "id": "60805" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "id": "VAR-201306-0167", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63386" } ], "trust": 0.5813291333333334 }, "last_update_date": "2023-12-18T13:09:31.368000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "29452", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=29452" }, { "title": "cisco-sa-20130626-wsa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "title": "29746", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29746" }, { "title": "cisco-sa-20130626-sma", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118426_cisco-sa-20130626-sma-j.html" }, { "title": "cisco-sa-20130626-wsa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118424_cisco-sa-20130626-wsa-j.html" }, { "title": "cisco-sa-20130626-esa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118427_cisco-sa-20130626-esa-j.html" }, { "title": "Cisco AsyncOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186286" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63386" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-wsa" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3384" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3384" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60805" }, { "trust": 0.3, "url": "http://www.cisco.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63386" }, { "db": "BID", "id": "60805" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63386" }, { "db": "BID", "id": "60805" }, { "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "db": "NVD", "id": "CVE-2013-3384" }, { "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-27T00:00:00", "db": "VULHUB", "id": "VHN-63386" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60805" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "date": "2013-06-27T21:55:07.023000", "db": "NVD", "id": "CVE-2013-3384" }, { "date": "2013-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-63386" }, { "date": "2013-06-26T00:00:00", "db": "BID", "id": "60805" }, { "date": "2013-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003153" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2013-3384" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-502" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-502" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security Runs on the appliance device AsyncOS Vulnerable to arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003153" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-502" } ], "trust": 0.6 } }
var-202006-1153
Vulnerability from variot
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. AsyncOS Software is a set of operating systems running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1153", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "13.5.0" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-3368" } ] }, "cve": "CVE-2020-3368", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006921", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-41805", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006921", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-3368", "trust": 1.0, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3368", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-006921", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-41805", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202006-1145", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. AsyncOS Software is a set of operating systems running in it", "sources": [ { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "CNVD", "id": "CNVD-2020-41805" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3368", "trust": 3.0 }, { "db": "AUSCERT", "id": "ESB-2020.2120", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2020-006921", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-41805", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1145", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "id": "VAR-202006-1153", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" } ], "trust": 1.03892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" } ] }, "last_update_date": "2023-12-18T14:00:29.264000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-esa-url-bypass-WO4BZ75s", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-url-bypass-wo4bz75s" }, { "title": "Patch for Cisco Email Security Appliance AsyncOS Software input validation error vulnerability (CNVD-2020-41805)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/226365" }, { "title": "Cisco Email Security Appliance AsyncOS Software Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=121838" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-url-bypass-wo4bz75s" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3368" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2020.2120/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3368" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-email-security-appliance-privilege-escalation-via-url-filtering-bypass-32556" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-41805" }, { "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "db": "NVD", "id": "CVE-2020-3368" }, { "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2020-41805" }, { "date": "2020-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "date": "2020-06-18T03:15:14.793000", "db": "NVD", "id": "CVE-2020-3368" }, { "date": "2020-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-41805" }, { "date": "2020-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006921" }, { "date": "2021-08-06T18:50:22.433000", "db": "NVD", "id": "CVE-2020-3368" }, { "date": "2020-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1145" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1145" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance of AsyncOS Input verification vulnerabilities in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006921" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1145" } ], "trust": 0.6 } }
var-202011-1014
Vulnerability from variot
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. Cisco AsyncOS is an operating system for Cisco devices developed by Cisco
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1014", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.5.0" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.7.2-011" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.5.1-011" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.0.2" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.0.0" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.8.0" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.8.2-009" }, { "model": "cisco asyncos", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.7.2-011", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.8.2-009", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.2", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.1-011", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-3367" } ] }, "cve": "CVE-2020-3367", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2020-3367", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-181492", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ykramarz@cisco.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-3367", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-3367", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3367", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202011-1621", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-181492", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-3367", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-181492" }, { "db": "VULMON", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. Cisco AsyncOS is an operating system for Cisco devices developed by Cisco", "sources": [ { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "VULHUB", "id": "VHN-181492" }, { "db": "VULMON", "id": "CVE-2020-3367" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3367", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-013780", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202011-1621", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.4102", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4102.2", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-66207", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-181492", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-3367", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-181492" }, { "db": "VULMON", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "id": "VAR-202011-1014", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-181492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:37.578000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-wsa-prv-esc-nPzWZrQj", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wsa-prv-esc-npzwzrqj" }, { "title": "Cisco AsyncOS Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135767" }, { "title": "Cisco: Cisco Secure Web Appliance Privilege Escalation Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-wsa-prv-esc-npzwzrqj" }, { "title": null, "trust": 0.1, "url": "https://www.theregister.co.uk/2021/01/22/cisco_critical_vulnerabilities/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 }, { "problemtype": "OS Command injection (CWE-78) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-181492" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wsa-prv-esc-npzwzrqj" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3367" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-secure-web-appliance-privilege-escalation-via-log-subscription-subsystem-33918" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4102.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4102/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-181492" }, { "db": "VULMON", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-181492" }, { "db": "VULMON", "id": "CVE-2020-3367" }, { "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "db": "NVD", "id": "CVE-2020-3367" }, { "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-18T00:00:00", "db": "VULHUB", "id": "VHN-181492" }, { "date": "2020-11-18T00:00:00", "db": "VULMON", "id": "CVE-2020-3367" }, { "date": "2021-07-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "date": "2020-11-18T18:15:12.480000", "db": "NVD", "id": "CVE-2020-3367" }, { "date": "2020-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-02T00:00:00", "db": "VULHUB", "id": "VHN-181492" }, { "date": "2020-12-02T00:00:00", "db": "VULMON", "id": "CVE-2020-3367" }, { "date": "2021-07-13T07:59:00", "db": "JVNDB", "id": "JVNDB-2020-013780" }, { "date": "2020-12-02T14:49:42.383000", "db": "NVD", "id": "CVE-2020-3367" }, { "date": "2021-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1621" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco\u00a0Secure\u00a0Web\u00a0Appliance\u00a0 for \u00a0Cisco\u00a0AsyncOS\u00a0 In \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013780" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1621" } ], "trust": 0.6 } }
var-201610-0337
Vulnerability from variot
A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuz02235 It is released as.By any third party Web Script or HTML May be inserted. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. A security vulnerability exists in Cisco AsyncOS that allows an attacker to exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. This issue is being tracked by Cisco Bug ID CSCuz02235
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0337", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "BID", "id": "93912" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1423" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93912" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ], "trust": 0.9 }, "cve": "CVE-2016-1423", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1423", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-10398", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-90242", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-1423", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1423", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-10398", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-751", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90242", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "VULHUB", "id": "VHN-90242" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuz02235 It is released as.By any third party Web Script or HTML May be inserted. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. A security vulnerability exists in Cisco AsyncOS that allows an attacker to exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. \nThis issue is being tracked by Cisco Bug ID CSCuz02235", "sources": [ { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "BID", "id": "93912" }, { "db": "VULHUB", "id": "VHN-90242" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1423", "trust": 3.4 }, { "db": "BID", "id": "93912", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037113", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005644", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-751", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10398", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90242", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "VULHUB", "id": "VHN-90242" }, { "db": "BID", "id": "93912" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "id": "VAR-201610-0337", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "VULHUB", "id": "VHN-90242" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" } ] }, "last_update_date": "2023-12-18T13:39:09.206000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa4", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa4" }, { "title": "CiscoAsyncOS Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83244" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65107" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90242" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/93912" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa4" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037113" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1423" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1423" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "VULHUB", "id": "VHN-90242" }, { "db": "BID", "id": "93912" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10398" }, { "db": "VULHUB", "id": "VHN-90242" }, { "db": "BID", "id": "93912" }, { "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "db": "NVD", "id": "CVE-2016-1423" }, { "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10398" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-90242" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93912" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "date": "2016-10-28T10:59:00.213000", "db": "NVD", "id": "CVE-2016-1423" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10398" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-90242" }, { "date": "2016-11-24T10:04:00", "db": "BID", "id": "93912" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005644" }, { "date": "2017-07-29T01:34:07.303000", "db": "NVD", "id": "CVE-2016-1423" }, { "date": "2016-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-751" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-751" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Runs on the appliance device AsyncOS of MIQ Cross-site scripting vulnerability in view email message display", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005644" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-751" } ], "trust": 0.6 } }
var-202107-1554
Vulnerability from variot
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Web Security Appliance (WSA) is a web security appliance of Cisco (Cisco). The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1554", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.0.3-005" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.5.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.8.0-429" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "12.5.2" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.8.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.8.0-453" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-1359" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-429:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-453:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.2", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-1359" } ] }, "cve": "CVE-2021-1359", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374413", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1359", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-1359", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1359", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-380", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374413", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-1359", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-374413" }, { "db": "VULMON", "id": "CVE-2021-1359" }, { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Web Security Appliance (WSA) is a web security appliance of Cisco (Cisco). The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation", "sources": [ { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-374413" }, { "db": "VULMON", "id": "CVE-2021-1359" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1359", "trust": 1.8 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2332.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2332", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021070810", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202107-380", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374413", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-1359", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374413" }, { "db": "VULMON", "id": "CVE-2021-1359" }, { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "id": "VAR-202107-1554", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-374413" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T11:37:56.892000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco Web Security Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156215" }, { "title": "Cisco: Cisco Web Security Appliance Privilege Escalation Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-scr-web-priv-esc-k3hcgjz" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-bpa-wsa-bugs-cyberattacks/167654/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374413" }, { "db": "NVD", "id": "CVE-2021-1359" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-scr-web-priv-esc-k3hcgjz" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2332" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-shell-command-injection-via-an-xml-file-35835" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021070810" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2332.2" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1359" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/74.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-bpa-wsa-bugs-cyberattacks/167654/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-374413" }, { "db": "VULMON", "id": "CVE-2021-1359" }, { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-374413" }, { "db": "VULMON", "id": "CVE-2021-1359" }, { "db": "NVD", "id": "CVE-2021-1359" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-08T00:00:00", "db": "VULHUB", "id": "VHN-374413" }, { "date": "2021-07-08T00:00:00", "db": "VULMON", "id": "CVE-2021-1359" }, { "date": "2021-07-08T19:15:08.287000", "db": "NVD", "id": "CVE-2021-1359" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-26T00:00:00", "db": "VULHUB", "id": "VHN-374413" }, { "date": "2021-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-1359" }, { "date": "2023-11-07T03:28:05.377000", "db": "NVD", "id": "CVE-2021-1359" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-10-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-380" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-380" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pillow Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-380" } ], "trust": 1.2 } }
var-200906-0065
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter. IronPort AsyncOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. IronPort series C, M, and X appliances running versions prior to AsyncOS 6.5.2 are vulnerable. IronPort series products are widely used mail encryption gateways. AsyncOS is the operating system used by this product, which is specially designed to deal with the bottleneck of concurrent communication and the limitation of file-based mail queues. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: IronPort AsyncOS "referrer" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID: SA34895
VERIFY ADVISORY: http://secunia.com/advisories/34895/
DESCRIPTION: A vulnerability has been reported in IronPort AsyncOS, which can be exploited by malicious people to conduct cross-site scripting attacks.
NOTE: IronPort Series S appliances are not affected.
SOLUTION: Update to version 6.5.2, or apply fixes by using the upgrade command from the command line interface or by using the System Upgrade option in the graphical user interface (GUI).
PROVIDED AND/OR DISCOVERED BY: Reported by an anonymous person.
ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/viewAlert.x?alertId=18365
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200906-0065", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.0-304" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.0-307" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.0-306" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.5-110" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.5.1-005" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.6-003" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.3.6-003" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.6.4.0-273" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.5.0-405" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.3.5-003" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1.0-301" }, { "model": "ironport email security appliances", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-757" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-754" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "6.5.2" }, { "model": "e email security appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.5.1" }, { "model": "ironport asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.5.2" } ], "sources": [ { "db": "BID", "id": "35203" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.0.0-754:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.3.5-003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.3.6-003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.0.0-757:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.0-301:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.6.4.0-273:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.5.0-405:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.0-307:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.5-110:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.6-003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.0-304:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.1.0-306:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:6.5.1-005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:ironport_email_security_appliances:*:m:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ironport_email_security_appliances:*:c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ironport_email_security_appliances:*:x:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-1162" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Secunia", "sources": [ { "db": "PACKETSTORM", "id": "78104" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ], "trust": 0.7 }, "cve": "CVE-2009-1162", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-1162", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-38608", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-1162", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200906-071", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-38608", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-38608" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter. IronPort AsyncOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nIronPort series C, M, and X appliances running versions prior to AsyncOS 6.5.2 are vulnerable. IronPort series products are widely used mail encryption gateways. AsyncOS is the operating system used by this product, which is specially designed to deal with the bottleneck of concurrent communication and the limitation of file-based mail queues. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nIronPort AsyncOS \"referrer\" Cross-Site Scripting Vulnerability\n\nSECUNIA ADVISORY ID:\nSA34895\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34895/\n\nDESCRIPTION:\nA vulnerability has been reported in IronPort AsyncOS, which can be\nexploited by malicious people to conduct cross-site scripting\nattacks. \n\nNOTE: IronPort Series S appliances are not affected. \n\nSOLUTION:\nUpdate to version 6.5.2, or apply fixes by using the upgrade command\nfrom the command line interface or by using the System Upgrade option\nin the graphical user interface (GUI). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by an anonymous person. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://tools.cisco.com/security/center/viewAlert.x?alertId=18365\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "BID", "id": "35203" }, { "db": "VULHUB", "id": "VHN-38608" }, { "db": "PACKETSTORM", "id": "78104" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-1162", "trust": 2.8 }, { "db": "BID", "id": "35203", "trust": 2.8 }, { "db": "SECUNIA", "id": "34895", "trust": 2.6 }, { "db": "OSVDB", "id": "54884", "trust": 2.5 }, { "db": "SECTRACK", "id": "1022335", "trust": 2.5 }, { "db": "XF", "id": "50948", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2009-002661", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200906-071", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-38608", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "78104", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-38608" }, { "db": "BID", "id": "35203" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "PACKETSTORM", "id": "78104" }, { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "id": "VAR-200906-0065", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-38608" } ], "trust": 0.59887304 }, "last_update_date": "2023-12-18T13:04:41.674000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "18365", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=18365" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-002661" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-38608" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "NVD", "id": "CVE-2009-1162" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/35203" }, { "trust": 2.5, "url": "http://osvdb.org/54884" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1022335" }, { "trust": 2.5, "url": "http://secunia.com/advisories/34895" }, { "trust": 2.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=18365" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/50948" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50948" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1162" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1162" }, { "trust": 0.3, "url": "http://www.ironport.com/products/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34895/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-38608" }, { "db": "BID", "id": "35203" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "PACKETSTORM", "id": "78104" }, { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-38608" }, { "db": "BID", "id": "35203" }, { "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "db": "PACKETSTORM", "id": "78104" }, { "db": "NVD", "id": "CVE-2009-1162" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-06-05T00:00:00", "db": "VULHUB", "id": "VHN-38608" }, { "date": "2009-06-03T00:00:00", "db": "BID", "id": "35203" }, { "date": "2011-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "date": "2009-06-04T15:42:33", "db": "PACKETSTORM", "id": "78104" }, { "date": "2009-06-05T16:00:00.280000", "db": "NVD", "id": "CVE-2009-1162" }, { "date": "2009-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-17T00:00:00", "db": "VULHUB", "id": "VHN-38608" }, { "date": "2009-06-04T15:59:00", "db": "BID", "id": "35203" }, { "date": "2011-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-002661" }, { "date": "2017-08-17T01:30:12.850000", "db": "NVD", "id": "CVE-2009-1162" }, { "date": "2009-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200906-071" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200906-071" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS of Spam Quarantine Cross-site scripting vulnerability in login page", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-002661" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "78104" }, { "db": "CNNVD", "id": "CNNVD-200906-071" } ], "trust": 0.7 } }
var-201502-0139
Vulnerability from variot
The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343. Cisco AsyncOS is Cisco's custom operating system for the performance and security of all messaging applications. Cisco AsyncOS Software is prone to a remote security-bypass vulnerability. This issue is being tracked by Cisco Bug ID CSCzv54343
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0139", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lte", "trust": 1.8, "vendor": "cisco", "version": "8.5" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0605" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "72528" } ], "trust": 0.3 }, "cve": "CVE-2015-0605", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0605", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-00993", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-78551", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0605", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-00993", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201502-132", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78551", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "VULHUB", "id": "VHN-78551" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343. Cisco AsyncOS is Cisco\u0027s custom operating system for the performance and security of all messaging applications. Cisco AsyncOS Software is prone to a remote security-bypass vulnerability. \nThis issue is being tracked by Cisco Bug ID CSCzv54343", "sources": [ { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "BID", "id": "72528" }, { "db": "VULHUB", "id": "VHN-78551" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0605", "trust": 3.4 }, { "db": "BID", "id": "72528", "trust": 2.0 }, { "db": "SECUNIA", "id": "62829", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-001529", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201502-132", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-00993", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78551", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "VULHUB", "id": "VHN-78551" }, { "db": "BID", "id": "72528" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "id": "VAR-201502-0139", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "VULHUB", "id": "VHN-78551" } ], "trust": 1.4380951999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" } ] }, "last_update_date": "2023-12-18T13:44:21.675000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0605" }, { "title": "37384", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37384" }, { "title": "Patch for Cisco AsyncOS Software Remote Security Bypass Vulnerability (CNVD-2015-00993)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/55176" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78551" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37384" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0605" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/72528" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62829" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0605" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0605" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/72528/" }, { "trust": 0.3, "url": "www.cisco.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "VULHUB", "id": "VHN-78551" }, { "db": "BID", "id": "72528" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-00993" }, { "db": "VULHUB", "id": "VHN-78551" }, { "db": "BID", "id": "72528" }, { "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "db": "NVD", "id": "CVE-2015-0605" }, { "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-00993" }, { "date": "2015-02-07T00:00:00", "db": "VULHUB", "id": "VHN-78551" }, { "date": "2015-02-06T00:00:00", "db": "BID", "id": "72528" }, { "date": "2015-02-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "date": "2015-02-07T04:59:09", "db": "NVD", "id": "CVE-2015-0605" }, { "date": "2015-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-00993" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-78551" }, { "date": "2015-02-06T00:00:00", "db": "BID", "id": "72528" }, { "date": "2015-02-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001529" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2015-0605" }, { "date": "2015-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Runs on the appliance AsyncOS of uuencode Vulnerabilities that can bypass content restrictions in inspection engines", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001529" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-132" } ], "trust": 0.6 } }
var-201806-1036
Vulnerability from variot
A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875. Vendors have confirmed this vulnerability Bug ID CSCvg78875 It is released as.Information may be obtained. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS is an operating system that runs on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201806-1036", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.5.1" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "11.5.0-fcs-442" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "11.0.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.5.2" }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "asyncos 11.5.0-fcs-442", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.0-614" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-061" } ], "sources": [ { "db": "BID", "id": "104417" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.0-fcs-442:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.1-296:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0353" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104417" } ], "trust": 0.3 }, "cve": "CVE-2018-0353", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-0353", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-118555", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0353", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0353", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201806-392", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118555", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118555" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875. Vendors have confirmed this vulnerability Bug ID CSCvg78875 It is released as.Information may be obtained. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. AsyncOS is an operating system that runs on it", "sources": [ { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "BID", "id": "104417" }, { "db": "VULHUB", "id": "VHN-118555" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0353", "trust": 2.8 }, { "db": "BID", "id": "104417", "trust": 2.0 }, { "db": "SECTRACK", "id": "1041081", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-006118", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201806-392", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-118555", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118555" }, { "db": "BID", "id": "104417" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "id": "VAR-201806-1036", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118555" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T12:56:53.967000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180606-wsa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180606-wsa" }, { "title": "Cisco Web Security Appliance AsyncOS Fixing measures for security feature vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80739" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-254", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118555" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180606-wsa" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104417" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1041081" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0353" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0353" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118555" }, { "db": "BID", "id": "104417" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118555" }, { "db": "BID", "id": "104417" }, { "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "db": "NVD", "id": "CVE-2018-0353" }, { "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-07T00:00:00", "db": "VULHUB", "id": "VHN-118555" }, { "date": "2018-06-06T00:00:00", "db": "BID", "id": "104417" }, { "date": "2018-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "date": "2018-06-07T12:29:00.777000", "db": "NVD", "id": "CVE-2018-0353" }, { "date": "2018-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118555" }, { "date": "2018-06-06T00:00:00", "db": "BID", "id": "104417" }, { "date": "2018-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006118" }, { "date": "2019-10-09T23:31:51.537000", "db": "NVD", "id": "CVE-2018-0353" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-392" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201806-392" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance Vulnerabilities related to security functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006118" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201806-392" } ], "trust": 0.6 } }
var-201612-0162
Vulnerability from variot
A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. More Information: CSCvb04312. Known Affected Releases: 9.0.1-162 9.1.1-074. Known Fixed Releases: 10.1.0-129 9.1.2-010. Cisco AsyncOS is a set of operating systems used in this product. An attacker could exploit this vulnerability to restart the agent process, resulting in a denial of service condition. This issue is being tracked by Cisco Bug ID CSCvb04312
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0162", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.1-074" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.1-162" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0.1-162" }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-074" }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance all", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "BID", "id": "94775" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6469" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94775" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ], "trust": 0.9 }, "cve": "CVE-2016-6469", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6469", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-12228", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95289", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6469", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6469", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-12228", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-201", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95289", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "VULHUB", "id": "VHN-95289" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. More Information: CSCvb04312. Known Affected Releases: 9.0.1-162 9.1.1-074. Known Fixed Releases: 10.1.0-129 9.1.2-010. Cisco AsyncOS is a set of operating systems used in this product. An attacker could exploit this vulnerability to restart the agent process, resulting in a denial of service condition. \nThis issue is being tracked by Cisco Bug ID CSCvb04312", "sources": [ { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "BID", "id": "94775" }, { "db": "VULHUB", "id": "VHN-95289" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6469", "trust": 3.4 }, { "db": "BID", "id": "94775", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-006322", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-201", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-12228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95289", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "VULHUB", "id": "VHN-95289" }, { "db": "BID", "id": "94775" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "id": "VAR-201612-0162", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "VULHUB", "id": "VHN-95289" } ], "trust": 1.29216826 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" } ] }, "last_update_date": "2023-12-18T13:39:08.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161207-wsa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-wsa" }, { "title": "Patch for Cisco AsyncOS Remote Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/85528" }, { "title": "Cisco AsyncOS for Cisco Web Security Appliance Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66242" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95289" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-wsa" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94775" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6469" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6469" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "VULHUB", "id": "VHN-95289" }, { "db": "BID", "id": "94775" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-12228" }, { "db": "VULHUB", "id": "VHN-95289" }, { "db": "BID", "id": "94775" }, { "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "db": "NVD", "id": "CVE-2016-6469" }, { "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2016-12228" }, { "date": "2016-12-14T00:00:00", "db": "VULHUB", "id": "VHN-95289" }, { "date": "2016-12-07T00:00:00", "db": "BID", "id": "94775" }, { "date": "2016-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "date": "2016-12-14T00:59:08.957000", "db": "NVD", "id": "CVE-2016-6469" }, { "date": "2016-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2016-12228" }, { "date": "2017-01-05T00:00:00", "db": "VULHUB", "id": "VHN-95289" }, { "date": "2016-12-20T00:08:00", "db": "BID", "id": "94775" }, { "date": "2016-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006322" }, { "date": "2017-01-05T13:35:49.663000", "db": "NVD", "id": "CVE-2016-6469" }, { "date": "2016-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-201" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-201" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security For appliance AsyncOS of HTTP URL Service disruption in syntax analysis (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006322" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-201" } ], "trust": 0.6 } }
var-201901-0592
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages. CiscoEmailSecurityAppliance (ESA) is an email security appliance from Cisco. AsyncOSSoftware is the operating system used in it. This issue is being tracked by Cisco Bug ID CSCvm81627
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201901-0592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "11.1.0" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.0.2-044_md" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "11.1.2-023_md" }, { "model": "e email security appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance none", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.1.0-135" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0.2-037" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0.0-274" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.3-004" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0.0-281" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.2-023" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.2-044" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "BID", "id": "106507" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.0.2-044_md", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1.2-023_md", "versionStartIncluding": "11.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-15460" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability was found during the resolution of a Cisco TAC support case.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-291" } ], "trust": 0.6 }, "cve": "CVE-2018-15460", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15460", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-01872", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-125722", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15460", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-15460", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2018-15460", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-01872", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201901-291", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-125722", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-15460", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "VULHUB", "id": "VHN-125722" }, { "db": "VULMON", "id": "CVE-2018-15460" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages. CiscoEmailSecurityAppliance (ESA) is an email security appliance from Cisco. AsyncOSSoftware is the operating system used in it. \nThis issue is being tracked by Cisco Bug ID CSCvm81627", "sources": [ { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "BID", "id": "106507" }, { "db": "VULHUB", "id": "VHN-125722" }, { "db": "VULMON", "id": "CVE-2018-15460" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15460", "trust": 3.5 }, { "db": "BID", "id": "106507", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2019-001924", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201901-291", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-01872", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-125722", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-15460", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "VULHUB", "id": "VHN-125722" }, { "db": "VULMON", "id": "CVE-2018-15460" }, { "db": "BID", "id": "106507" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "id": "VAR-201901-0592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "VULHUB", "id": "VHN-125722" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" } ] }, "last_update_date": "2023-12-18T13:18:51.095000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190109-esa-url-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-url-dos" }, { "title": "Cisco Email Security Appliance AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=88492" }, { "title": "Cisco: Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20190109-esa-url-dos" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-default-password-bug/142814/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-critical-vulnerability-patch/140726/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-15460" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125722" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-url-dos" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/106507" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15460" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15460" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-critical-vulnerability-patch/140726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "VULHUB", "id": "VHN-125722" }, { "db": "VULMON", "id": "CVE-2018-15460" }, { "db": "BID", "id": "106507" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-01872" }, { "db": "VULHUB", "id": "VHN-125722" }, { "db": "VULMON", "id": "CVE-2018-15460" }, { "db": "BID", "id": "106507" }, { "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "db": "NVD", "id": "CVE-2018-15460" }, { "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2019-01872" }, { "date": "2019-01-10T00:00:00", "db": "VULHUB", "id": "VHN-125722" }, { "date": "2019-01-10T00:00:00", "db": "VULMON", "id": "CVE-2018-15460" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106507" }, { "date": "2019-03-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "date": "2019-01-10T22:29:00.237000", "db": "NVD", "id": "CVE-2018-15460" }, { "date": "2019-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2019-01872" }, { "date": "2020-09-16T00:00:00", "db": "VULHUB", "id": "VHN-125722" }, { "date": "2020-09-16T00:00:00", "db": "VULMON", "id": "CVE-2018-15460" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106507" }, { "date": "2019-03-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001924" }, { "date": "2020-09-16T14:14:08.843000", "db": "NVD", "id": "CVE-2018-15460" }, { "date": "2020-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-291" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-291" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliances Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001924" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-291" } ], "trust": 0.6 } }
var-201610-0316
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz63143. Known Affected Releases: 8.5.7-042 9.7.0-125. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuz63143 It is released as.Service disruption by a third party (DoS) Status and scanning and email forwarding will be stopped There is a possibility. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. An attacker can exploit this issue to restart the device, resulting in denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuz63143
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.3.1-09" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6.3-025" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.3.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.4" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.1-gpl-022" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-051" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.3-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.8.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.3.1" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.8.0-311" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.2" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.1" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.1" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.2" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.1-023" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.5" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.3.2" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-038" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-125" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "BID", "id": "93907" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.8.0-311:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.3-025:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.2-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.1-gpl-022:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:3.3.1-09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.3-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6356" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93907" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ], "trust": 0.9 }, "cve": "CVE-2016-6356", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6356", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10394", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95176", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6356", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6356", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10394", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-753", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-95176", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-6356", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULHUB", "id": "VHN-95176" }, { "db": "VULMON", "id": "CVE-2016-6356" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz63143. Known Affected Releases: 8.5.7-042 9.7.0-125. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuz63143 It is released as.Service disruption by a third party (DoS) Status and scanning and email forwarding will be stopped There is a possibility. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. \nAn attacker can exploit this issue to restart the device, resulting in denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCuz63143", "sources": [ { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "BID", "id": "93907" }, { "db": "VULHUB", "id": "VHN-95176" }, { "db": "VULMON", "id": "CVE-2016-6356" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6356", "trust": 3.5 }, { "db": "BID", "id": "93907", "trust": 2.7 }, { "db": "SECTRACK", "id": "1037122", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-005648", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-753", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10394", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95176", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6356", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULHUB", "id": "VHN-95176" }, { "db": "VULMON", "id": "CVE-2016-6356" }, { "db": "BID", "id": "93907" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "id": "VAR-201610-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULHUB", "id": "VHN-95176" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" } ] }, "last_update_date": "2023-12-18T12:20:19.196000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa3", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa3" }, { "title": "Patch for CiscoAsyncOS Denial of Service Vulnerability (CNVD-2016-10394)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83242" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65109" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULMON", "id": "CVE-2016-6356" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95176" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/93907" }, { "trust": 2.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa3" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1037122" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6356" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6356" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULHUB", "id": "VHN-95176" }, { "db": "VULMON", "id": "CVE-2016-6356" }, { "db": "BID", "id": "93907" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10394" }, { "db": "VULHUB", "id": "VHN-95176" }, { "db": "VULMON", "id": "CVE-2016-6356" }, { "db": "BID", "id": "93907" }, { "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "db": "NVD", "id": "CVE-2016-6356" }, { "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10394" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-95176" }, { "date": "2016-10-28T00:00:00", "db": "VULMON", "id": "CVE-2016-6356" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93907" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "date": "2016-10-28T10:59:06.587000", "db": "NVD", "id": "CVE-2016-6356" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10394" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95176" }, { "date": "2017-07-29T00:00:00", "db": "VULMON", "id": "CVE-2016-6356" }, { "date": "2016-11-24T07:03:00", "db": "BID", "id": "93907" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005648" }, { "date": "2017-07-29T01:34:17.677000", "db": "NVD", "id": "CVE-2016-6356" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-753" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ESA Run on device AsyncOS Service disruption in software email message filtering function (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005648" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-753" } ], "trust": 0.6 } }
var-201502-0152
Vulnerability from variot
The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. Vendors have confirmed this vulnerability CSCur44412 , CSCur44415 , CSCur89630 , CSCur89636 , CSCur89633 ,and CSCur89639 It is released as.Skillfully crafted by a third party HTTP A redirect may be triggered via the header. Cisco AsyncOS is a set of operating systems used in these products. Cisco AsyncOS Software is prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input. An attacker can leverage this issue to conduct phishing attacks; other attacks are possible. This issue is being tracked by Cisco Bug ID's CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. The following products are affected: ESA, Content SMA, WSA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0152", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.2, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "asyncos 8.5" }, { "model": "e email security the appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(asyncos 8.5 )" }, { "model": "web security the appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(asyncos 8.5 )" }, { "model": "content security management appliance", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "(asyncos 8.3 )" }, { "model": "content security management appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0624" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Glafkos Charalambous", "sources": [ { "db": "BID", "id": "72702" } ], "trust": 0.3 }, "cve": "CVE-2015-0624", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0624", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-01347", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-78570", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0624", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-01347", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201502-379", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78570", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-0624", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "VULHUB", "id": "VHN-78570" }, { "db": "VULMON", "id": "CVE-2015-0624" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. Vendors have confirmed this vulnerability CSCur44412 , CSCur44415 , CSCur89630 , CSCur89636 , CSCur89633 ,and CSCur89639 It is released as.Skillfully crafted by a third party HTTP A redirect may be triggered via the header. Cisco AsyncOS is a set of operating systems used in these products. Cisco AsyncOS Software is prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker can leverage this issue to conduct phishing attacks; other attacks are possible. \nThis issue is being tracked by Cisco Bug ID\u0027s CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. The following products are affected: ESA, Content SMA, WSA", "sources": [ { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "BID", "id": "72702" }, { "db": "VULHUB", "id": "VHN-78570" }, { "db": "VULMON", "id": "CVE-2015-0624" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-78570", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-78570" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0624", "trust": 3.5 }, { "db": "BID", "id": "72702", "trust": 1.5 }, { "db": "PACKETSTORM", "id": "130525", "trust": 1.2 }, { "db": "SECTRACK", "id": "1031781", "trust": 1.2 }, { "db": "SECTRACK", "id": "1031782", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2015-001580", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201502-379", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-01347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78570", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-0624", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "VULHUB", "id": "VHN-78570" }, { "db": "VULMON", "id": "CVE-2015-0624" }, { "db": "BID", "id": "72702" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "id": "VAR-201502-0152", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "VULHUB", "id": "VHN-78570" } ], "trust": 1.1425819499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" } ] }, "last_update_date": "2023-12-18T13:53:19.032000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS Software HTTP Redirect Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0624" }, { "title": "37544", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37544" }, { "title": "Cisco AsyncOS Web Framework Input Patch for Validation Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/55644" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78570" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0624" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/72702" }, { "trust": 1.3, "url": "http://packetstormsecurity.com/files/130525/cisco-ironport-asyncos-http-header-injection.html" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1031781" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1031782" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0624" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0624" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "VULHUB", "id": "VHN-78570" }, { "db": "VULMON", "id": "CVE-2015-0624" }, { "db": "BID", "id": "72702" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "VULHUB", "id": "VHN-78570" }, { "db": "VULMON", "id": "CVE-2015-0624" }, { "db": "BID", "id": "72702" }, { "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "db": "NVD", "id": "CVE-2015-0624" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-01347" }, { "date": "2015-02-21T00:00:00", "db": "VULHUB", "id": "VHN-78570" }, { "date": "2015-02-21T00:00:00", "db": "VULMON", "id": "CVE-2015-0624" }, { "date": "2015-02-20T00:00:00", "db": "BID", "id": "72702" }, { "date": "2015-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "date": "2015-02-21T11:59:02.920000", "db": "NVD", "id": "CVE-2015-0624" }, { "date": "2015-02-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-01347" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-78570" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2015-0624" }, { "date": "2015-03-08T16:02:00", "db": "BID", "id": "72702" }, { "date": "2015-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001580" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2015-0624" }, { "date": "2015-02-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-379" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-379" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS Web Framework Input Validation Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2015-01347" }, { "db": "CNNVD", "id": "CNNVD-201502-379" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-379" } ], "trust": 0.6 } }
var-201709-0678
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354. Vendors have confirmed this vulnerability Bug ID CSCvd29354 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOS Software is the operating system used in it. The following releases are affected: Cisco AsyncOS Software Release 9.0, Release 9.1, Release 9.6, Release 9.7, Release 9.8, Release 10.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0678", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.8" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.2" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ironport messaging gateway appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "x10709.7.2-065" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7.2-065" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.1-087" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-203" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.8.1-015" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.0-264" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.2-020" } ], "sources": [ { "db": "BID", "id": "100920" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12215" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "100920" } ], "trust": 0.3 }, "cve": "CVE-2017-12215", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12215", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-102715", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.5, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12215", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12215", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201709-1039", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-102715", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-12215", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-102715" }, { "db": "VULMON", "id": "CVE-2017-12215" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354. Vendors have confirmed this vulnerability Bug ID CSCvd29354 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOS Software is the operating system used in it. The following releases are affected: Cisco AsyncOS Software Release 9.0, Release 9.1, Release 9.6, Release 9.7, Release 9.8, Release 10.0", "sources": [ { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "BID", "id": "100920" }, { "db": "VULHUB", "id": "VHN-102715" }, { "db": "VULMON", "id": "CVE-2017-12215" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12215", "trust": 2.9 }, { "db": "BID", "id": "100920", "trust": 2.1 }, { "db": "SECTRACK", "id": "1039414", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-008414", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-1039", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-102715", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-12215", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102715" }, { "db": "VULMON", "id": "CVE-2017-12215" }, { "db": "BID", "id": "100920" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "id": "VAR-201709-0678", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-102715" } ], "trust": 0.6885088899999999 }, "last_update_date": "2023-12-18T13:19:21.145000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170920-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170920-esa" }, { "title": "Cisco Email Security Appliance AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75053" }, { "title": "Cisco: Cisco Email Security Appliance Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170920-esa" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-12215" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102715" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170920-esa" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/100920" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1039414" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12215" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12215" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-102715" }, { "db": "VULMON", "id": "CVE-2017-12215" }, { "db": "BID", "id": "100920" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-102715" }, { "db": "VULMON", "id": "CVE-2017-12215" }, { "db": "BID", "id": "100920" }, { "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "db": "NVD", "id": "CVE-2017-12215" }, { "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-21T00:00:00", "db": "VULHUB", "id": "VHN-102715" }, { "date": "2017-09-21T00:00:00", "db": "VULMON", "id": "CVE-2017-12215" }, { "date": "2017-09-20T00:00:00", "db": "BID", "id": "100920" }, { "date": "2017-10-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "date": "2017-09-21T05:29:00.277000", "db": "NVD", "id": "CVE-2017-12215" }, { "date": "2017-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-102715" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2017-12215" }, { "date": "2017-09-20T00:00:00", "db": "BID", "id": "100920" }, { "date": "2017-10-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008414" }, { "date": "2019-10-09T23:22:29.450000", "db": "NVD", "id": "CVE-2017-12215" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance for AsyncOS Software input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008414" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1039" } ], "trust": 0.6 } }
var-201610-0342
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter that contains certain rules. More Information: CSCux59873. Known Affected Releases: 8.5.6-106 9.1.0-032 9.7.0-125. Known Fixed Releases: 9.1.1-038 9.7.1-066. Vendors have confirmed this vulnerability Bug ID CSCux59873 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCux59873. The following versions are affected: Cisco AsyncOS Software for Cisco ESA 8.5.6-106, 9.1.0-032, 9.7.0-125
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-051" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7.0-204" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7.0-132" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.3-027" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3-010" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.2-065" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.2-041" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-038" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-203" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-124" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "BID", "id": "93908" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1481" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93908" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ], "trust": 0.9 }, "cve": "CVE-2016-1481", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1481", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10393", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90300", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1481", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1481", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10393", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-752", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90300", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1481", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULHUB", "id": "VHN-90300" }, { "db": "VULMON", "id": "CVE-2016-1481" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter that contains certain rules. More Information: CSCux59873. Known Affected Releases: 8.5.6-106 9.1.0-032 9.7.0-125. Known Fixed Releases: 9.1.1-038 9.7.1-066. Vendors have confirmed this vulnerability Bug ID CSCux59873 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCux59873. The following versions are affected: Cisco AsyncOS Software for Cisco ESA 8.5.6-106, 9.1.0-032, 9.7.0-125", "sources": [ { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "BID", "id": "93908" }, { "db": "VULHUB", "id": "VHN-90300" }, { "db": "VULMON", "id": "CVE-2016-1481" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1481", "trust": 3.5 }, { "db": "BID", "id": "93908", "trust": 2.7 }, { "db": "SECTRACK", "id": "1037123", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-005646", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-752", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10393", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-1481", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULHUB", "id": "VHN-90300" }, { "db": "VULMON", "id": "CVE-2016-1481" }, { "db": "BID", "id": "93908" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "id": "VAR-201610-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULHUB", "id": "VHN-90300" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" } ] }, "last_update_date": "2023-12-18T13:24:36.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa1", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa1" }, { "title": "Patch for CiscoAsyncOS Denial of Service Vulnerability (CNVD-2016-10393)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83243" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65108" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULMON", "id": "CVE-2016-1481" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90300" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/93908" }, { "trust": 2.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa1" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1037123" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1481" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1481" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULHUB", "id": "VHN-90300" }, { "db": "VULMON", "id": "CVE-2016-1481" }, { "db": "BID", "id": "93908" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10393" }, { "db": "VULHUB", "id": "VHN-90300" }, { "db": "VULMON", "id": "CVE-2016-1481" }, { "db": "BID", "id": "93908" }, { "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "db": "NVD", "id": "CVE-2016-1481" }, { "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10393" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-90300" }, { "date": "2016-10-28T00:00:00", "db": "VULMON", "id": "CVE-2016-1481" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93908" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "date": "2016-10-28T10:59:03.713000", "db": "NVD", "id": "CVE-2016-1481" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10393" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-90300" }, { "date": "2017-07-29T00:00:00", "db": "VULMON", "id": "CVE-2016-1481" }, { "date": "2016-11-24T00:04:00", "db": "BID", "id": "93908" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005646" }, { "date": "2017-07-29T01:34:07.413000", "db": "NVD", "id": "CVE-2016-1481" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-752" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-752" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ESA Run on device AsyncOS Service disruption in software email message filtering function (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005646" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-752" } ], "trust": 0.6 } }
var-201711-0364
Vulnerability from variot
A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943. Cisco Web Security Appliance AsyncOS There is a security check vulnerability in the software. Vendors have confirmed this vulnerability Bug ID CSCvf52943 It is released as.Information may be tampered with. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. Cisco AsyncOS Software is an operating system that runs on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0364", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.1.1-234" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.1.1-235" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1.1-235" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1.1-234" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "advanced malware protection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "BID", "id": "101932" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:10.1.1-234:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:10.1.1-235:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12303" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "101932" } ], "trust": 0.3 }, "cve": "CVE-2017-12303", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12303", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-102812", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12303", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12303", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201711-676", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-102812", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-102812" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943. Cisco Web Security Appliance AsyncOS There is a security check vulnerability in the software. Vendors have confirmed this vulnerability Bug ID CSCvf52943 It is released as.Information may be tampered with. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. Cisco AsyncOS Software is an operating system that runs on it", "sources": [ { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "BID", "id": "101932" }, { "db": "VULHUB", "id": "VHN-102812" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12303", "trust": 2.8 }, { "db": "BID", "id": "101932", "trust": 2.0 }, { "db": "SECTRACK", "id": "1039828", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-010469", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201711-676", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-102812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102812" }, { "db": "BID", "id": "101932" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "id": "VAR-201711-0364", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-102812" } ], "trust": 0.69216826 }, "last_update_date": "2023-12-18T13:08:41.368000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20171115-wsa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171115-wsa" }, { "title": "Cisco Web Security Appliance Cisco AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76500" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-358", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102812" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171115-wsa" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/101932" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039828" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12303" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12303" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-102812" }, { "db": "BID", "id": "101932" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-102812" }, { "db": "BID", "id": "101932" }, { "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "db": "NVD", "id": "CVE-2017-12303" }, { "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-16T00:00:00", "db": "VULHUB", "id": "VHN-102812" }, { "date": "2017-11-15T00:00:00", "db": "BID", "id": "101932" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "date": "2017-11-16T07:29:00.430000", "db": "NVD", "id": "CVE-2017-12303" }, { "date": "2017-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-102812" }, { "date": "2017-12-19T22:00:00", "db": "BID", "id": "101932" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010469" }, { "date": "2019-10-09T23:22:53.777000", "db": "NVD", "id": "CVE-2017-12303" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-676" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-676" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance AsyncOS Vulnerabilities related to security checks in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010469" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-676" } ], "trust": 0.6 } }
var-201610-0343
Vulnerability from variot
A vulnerability in the email attachment scanning functionality of the Advanced Malware Protection (AMP) feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects Cisco AsyncOS Software releases 9.7.1 and later, prior to the first fixed release, for both virtual and hardware Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuy99453. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 10.0.0-125 9.7.1-207 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuy99453 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlService disruption by a third party (DoS) Status and scanning and email forwarding will be stopped There is a possibility. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. A remote denial of service vulnerability exists in Cisco AsyncOS 9.7.1 and later, which is exploited by an unauthenticated remote attacker to cause a denial of service. An attacker can exploit this issue to cause a denial-of-service condition. Cisco AsyncOS Software versions 9.7.1 and later are affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0-051" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": "gte", "trust": 0.6, "vendor": "cisco", "version": "9.7.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.7.1-207" }, { "model": "asyncos software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-125" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "BID", "id": "93906" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1486" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93906" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ], "trust": 0.9 }, "cve": "CVE-2016-1486", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1486", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10395", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90305", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1486", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1486", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10395", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-749", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90305", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1486", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULHUB", "id": "VHN-90305" }, { "db": "VULMON", "id": "CVE-2016-1486" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email attachment scanning functionality of the Advanced Malware Protection (AMP) feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects Cisco AsyncOS Software releases 9.7.1 and later, prior to the first fixed release, for both virtual and hardware Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuy99453. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 10.0.0-125 9.7.1-207 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuy99453 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlService disruption by a third party (DoS) Status and scanning and email forwarding will be stopped There is a possibility. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. A remote denial of service vulnerability exists in Cisco AsyncOS 9.7.1 and later, which is exploited by an unauthenticated remote attacker to cause a denial of service. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nCisco AsyncOS Software versions 9.7.1 and later are affected", "sources": [ { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "BID", "id": "93906" }, { "db": "VULHUB", "id": "VHN-90305" }, { "db": "VULMON", "id": "CVE-2016-1486" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1486", "trust": 3.5 }, { "db": "BID", "id": "93906", "trust": 2.7 }, { "db": "SECTRACK", "id": "1037124", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-005647", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-749", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10395", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90305", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-1486", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULHUB", "id": "VHN-90305" }, { "db": "VULMON", "id": "CVE-2016-1486" }, { "db": "BID", "id": "93906" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "id": "VAR-201610-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULHUB", "id": "VHN-90305" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" } ] }, "last_update_date": "2023-12-18T12:29:54.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa2", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa2" }, { "title": "Patch for CiscoAsyncOS Denial of Service Vulnerability (CNVD-2016-10395)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83241" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65105" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULMON", "id": "CVE-2016-1486" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-19", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90305" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/93906" }, { "trust": 2.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa2" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1037124" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1486" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1486" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/19.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULHUB", "id": "VHN-90305" }, { "db": "VULMON", "id": "CVE-2016-1486" }, { "db": "BID", "id": "93906" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10395" }, { "db": "VULHUB", "id": "VHN-90305" }, { "db": "VULMON", "id": "CVE-2016-1486" }, { "db": "BID", "id": "93906" }, { "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "db": "NVD", "id": "CVE-2016-1486" }, { "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10395" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-90305" }, { "date": "2016-10-28T00:00:00", "db": "VULMON", "id": "CVE-2016-1486" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93906" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "date": "2016-10-28T10:59:05.197000", "db": "NVD", "id": "CVE-2016-1486" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10395" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-90305" }, { "date": "2017-07-29T00:00:00", "db": "VULMON", "id": "CVE-2016-1486" }, { "date": "2016-11-24T00:04:00", "db": "BID", "id": "93906" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005647" }, { "date": "2017-07-29T01:34:07.460000", "db": "NVD", "id": "CVE-2016-1486" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-749" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-749" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ESA Run on device AsyncOS Software Advanced Malware Protection Service disruption in functionality (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005647" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-749" } ], "trust": 0.6 } }
var-201506-0245
Vulnerability from variot
The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733. The device provides spam protection, email encryption, and data loss prevention. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID's CSCuu35853 and CSCuu37733. The following versions are affected: Cisco ESA Appliance Release 3.3.1-09, Release 7.5.1-gpl-022, Release 8.5.6-074
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0245", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.331-09" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5.1-gpl-022" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3.3.1-09" }, { "model": "email security appliance 7.6.1-gpl-022", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.3.1-09" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.1-gpl-022" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3-010" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-023" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.7-043" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.2-055" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.3-027" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:3.331-09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:7.5.1-gpl-022:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4184" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "75181" } ], "trust": 0.3 }, "cve": "CVE-2015-4184", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-4184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-03867", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-82145", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4184", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-03867", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201506-249", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82145", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733. The device provides spam protection, email encryption, and data loss prevention. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nThis issue is being tracked by Cisco Bug ID\u0027s CSCuu35853 and CSCuu37733. The following versions are affected: Cisco ESA Appliance Release 3.3.1-09, Release 7.5.1-gpl-022, Release 8.5.6-074", "sources": [ { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "BID", "id": "75181" }, { "db": "VULHUB", "id": "VHN-82145" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4184", "trust": 3.4 }, { "db": "BID", "id": "75181", "trust": 2.0 }, { "db": "SECTRACK", "id": "1032582", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003078", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201506-249", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-03867", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82145", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "id": "VAR-201506-0245", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" } ] }, "last_update_date": "2023-12-18T12:45:04.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39339", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39339" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003078" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82145" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39339" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4184" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/75181" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032582" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4184" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-esa" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03867" }, { "date": "2015-06-13T00:00:00", "db": "VULHUB", "id": "VHN-82145" }, { "date": "2015-06-12T00:00:00", "db": "BID", "id": "75181" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "date": "2015-06-13T10:59:00.067000", "db": "NVD", "id": "CVE-2015-4184" }, { "date": "2015-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03867" }, { "date": "2017-01-04T00:00:00", "db": "VULHUB", "id": "VHN-82145" }, { "date": "2015-12-08T22:05:00", "db": "BID", "id": "75181" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "date": "2017-01-04T17:49:16.447000", "db": "NVD", "id": "CVE-2015-4184" }, { "date": "2015-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-249" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance Device Anti-spam Scanner Vulnerable to bypassing email restrictions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003078" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-249" } ], "trust": 0.6 } }
var-202202-1728
Vulnerability from variot
A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1728", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "13.5.4.102" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "14.0.2.020" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "13.5.0" }, { "model": "asyncos", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "13.0.3" }, { "model": "asyncos", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "14.0" }, { "model": "cisco asyncos", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco asyncos", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.2.020", "versionStartIncluding": "14.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.5.4.102", "versionStartIncluding": "13.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0.3", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-20653" } ] }, "cve": "CVE-2022-20653", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-20653", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-405206", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-20653", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-20653", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2022-20653", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-1312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-405206", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-20653", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-405206" }, { "db": "VULMON", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "db": "NVD", "id": "CVE-2022-20653" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition", "sources": [ { "db": "NVD", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "VULHUB", "id": "VHN-405206" }, { "db": "VULMON", "id": "CVE-2022-20653" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-20653", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-005869", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2022021621", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0688.3", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202202-1312", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-13368", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-405206", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-20653", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-405206" }, { "db": "VULMON", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "id": "VAR-202202-1728", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-405206" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:59:41.009000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-esa-dos-MxZvGtgU", "trust": 0.8, "url": "https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-dos-mxzvgtgu" }, { "title": "Cisco Email Security Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=183896" }, { "title": "Cisco: Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-esa-dos-mxzvgtgu" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "CNNVD", "id": "CNNVD-202202-1312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-dos-mxzvgtgu" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-20653" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-email-security-appliance-denial-of-service-via-email-dane-dns-verification-37580" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022021621" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0688.3" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-405206" }, { "db": "VULMON", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-405206" }, { "db": "VULMON", "id": "CVE-2022-20653" }, { "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "db": "NVD", "id": "CVE-2022-20653" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-17T00:00:00", "db": "VULHUB", "id": "VHN-405206" }, { "date": "2022-02-17T00:00:00", "db": "VULMON", "id": "CVE-2022-20653" }, { "date": "2023-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "date": "2022-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "date": "2022-02-17T15:15:09.377000", "db": "NVD", "id": "CVE-2022-20653" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-405206" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2022-20653" }, { "date": "2023-06-16T02:27:00", "db": "JVNDB", "id": "JVNDB-2022-005869" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-1312" }, { "date": "2023-11-07T03:42:32.423000", "db": "NVD", "id": "CVE-2022-20653" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-1312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco\u00a0Email\u00a0 for security appliances \u00a0Cisco\u00a0AsyncOS\u00a0 Software vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005869" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-1312" } ], "trust": 0.6 } }
var-201901-0602
Vulnerability from variot
A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA. Cisco Email Security Appliance (ESA) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOSSoftware is the operating system used in it. The vulnerability stems from the failure of the program to properly validate the S/MIME signed message. This issue is being tracked by Cisco Bug ID CSCvk73786. AsyncOS Software is a set of operating systems running on it. input verification
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201901-0602", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "11.1.0-131" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0.1-401" }, { "model": "e email security appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance none", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-061" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.2-042" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1-296" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-203" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0.0-281" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.1-042" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.1-037" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.2-044" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "BID", "id": "106511" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:11.0.1-401:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:11.1.0-131:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-15453" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "106511" } ], "trust": 0.3 }, "cve": "CVE-2018-15453", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15453", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-01871", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-125714", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15453", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-15453", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2018-15453", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-01871", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201901-290", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-125714", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "VULHUB", "id": "VHN-125714" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA. Cisco Email Security Appliance (ESA) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOSSoftware is the operating system used in it. The vulnerability stems from the failure of the program to properly validate the S/MIME signed message. \nThis issue is being tracked by Cisco Bug ID CSCvk73786. AsyncOS Software is a set of operating systems running on it. input verification", "sources": [ { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "BID", "id": "106511" }, { "db": "VULHUB", "id": "VHN-125714" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15453", "trust": 3.4 }, { "db": "BID", "id": "106511", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-013703", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201901-290", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-01871", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-125714", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "VULHUB", "id": "VHN-125714" }, { "db": "BID", "id": "106511" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "id": "VAR-201901-0602", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "VULHUB", "id": "VHN-125714" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" } ] }, "last_update_date": "2023-12-18T13:56:48.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190109-esa-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-dos" }, { "title": "Patch for CiscoEmailSecurityApplianceS/MIME Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/150471" }, { "title": "Cisco Email Security Appliance AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=88491" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125714" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/106511" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-dos" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15453" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15453" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "VULHUB", "id": "VHN-125714" }, { "db": "BID", "id": "106511" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-01871" }, { "db": "VULHUB", "id": "VHN-125714" }, { "db": "BID", "id": "106511" }, { "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "db": "NVD", "id": "CVE-2018-15453" }, { "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2019-01871" }, { "date": "2019-01-10T00:00:00", "db": "VULHUB", "id": "VHN-125714" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106511" }, { "date": "2019-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "date": "2019-01-10T18:29:00.500000", "db": "NVD", "id": "CVE-2018-15453" }, { "date": "2019-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2019-01871" }, { "date": "2020-09-16T00:00:00", "db": "VULHUB", "id": "VHN-125714" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106511" }, { "date": "2019-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013703" }, { "date": "2020-09-16T14:13:44.997000", "db": "NVD", "id": "CVE-2018-15453" }, { "date": "2020-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-290" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-290" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013703" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-290" } ], "trust": 0.6 } }
var-201612-0227
Vulnerability from variot
A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019. Vendors have confirmed this vulnerability Bug ID CSCul88715 , CSCul94617 , CSCul94627 It is released as.A remote attacker could impersonate an update server. There is a middleman security bypass vulnerability in CiscoAsyncOSSoftware. Allows an attacker to exploit a vulnerability to perform an unauthorized operation by performing a man-in-the-middle attack. Cisco AsyncOS Software is prone to security-bypass vulnerability. This may lead to other attacks. This issue is being tracked by Cisco Bug ID's CSCul88715, CSCul94617 and CSCul94627. Cisco AsyncOS is an operating system used in these products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-033" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-031" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-103" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.1-021" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7.5-835" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6.3-025" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.1-023" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-hp2-303" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-608" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.8.0-000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-201" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-004" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "BID", "id": "94791" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.1-021:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.3-025:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.2-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-103:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.5-835:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-031:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.5.2-hp2-303:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-608:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1411" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "94791" } ], "trust": 0.3 }, "cve": "CVE-2016-1411", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1411", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-12890", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-90230", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1411", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1411", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-12890", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-276", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90230", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "VULHUB", "id": "VHN-90230" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019. Vendors have confirmed this vulnerability Bug ID CSCul88715 , CSCul94617 , CSCul94627 It is released as.A remote attacker could impersonate an update server. There is a middleman security bypass vulnerability in CiscoAsyncOSSoftware. Allows an attacker to exploit a vulnerability to perform an unauthorized operation by performing a man-in-the-middle attack. Cisco AsyncOS Software is prone to security-bypass vulnerability. This may lead to other attacks. \nThis issue is being tracked by Cisco Bug ID\u0027s CSCul88715, CSCul94617 and CSCul94627. Cisco AsyncOS is an operating system used in these products", "sources": [ { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "BID", "id": "94791" }, { "db": "VULHUB", "id": "VHN-90230" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1411", "trust": 3.4 }, { "db": "BID", "id": "94791", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-006303", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-276", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-12890", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90230", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "VULHUB", "id": "VHN-90230" }, { "db": "BID", "id": "94791" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "id": "VAR-201612-0227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "VULHUB", "id": "VHN-90230" } ], "trust": 1.2410863666666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" } ] }, "last_update_date": "2023-12-18T12:51:28.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161207-asyncos", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-asyncos" }, { "title": "CiscoAsyncOSSoftware middleman security bypass vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/86521" }, { "title": "Cisco AsyncOS Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66315" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90230" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/94791" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-asyncos" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1411" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1411" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "VULHUB", "id": "VHN-90230" }, { "db": "BID", "id": "94791" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-12890" }, { "db": "VULHUB", "id": "VHN-90230" }, { "db": "BID", "id": "94791" }, { "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "db": "NVD", "id": "CVE-2016-1411" }, { "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-12890" }, { "date": "2016-12-14T00:00:00", "db": "VULHUB", "id": "VHN-90230" }, { "date": "2016-12-07T00:00:00", "db": "BID", "id": "94791" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "date": "2016-12-14T00:59:00.173000", "db": "NVD", "id": "CVE-2016-1411" }, { "date": "2016-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-12890" }, { "date": "2016-12-15T00:00:00", "db": "VULHUB", "id": "VHN-90230" }, { "date": "2016-12-20T01:08:00", "db": "BID", "id": "94791" }, { "date": "2016-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006303" }, { "date": "2016-12-15T15:18:46.033000", "db": "NVD", "id": "CVE-2016-1411" }, { "date": "2016-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security For appliance AsyncOS Vulnerability in software update function spoofing update server", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006303" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-276" } ], "trust": 0.6 } }
var-201706-0587
Vulnerability from variot
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device, as demonstrated by the Attachment Filter. More Information: CSCvd34632. Known Affected Releases: 10.0.1-087 9.7.1-066. Known Fixed Releases: 10.0.2-020 9.8.1-015. Vendors have confirmed this vulnerability Bug ID CSCvd34632 It is released as.A remote attacker could bypass the filters set on the device. CiscoEmailSecurityAppliance is a set of email security appliances. CiscoContentSecurityManagement is a unified email and web security management solution. An email scanning vulnerability exists in CiscoAsyncOSSoftware on CiscoEmailSecurityAppliance (ESA) devices. This vulnerability stems from incorrect authentication of emails with attachments and modified MIME headers. An unauthenticated remote attacker bypasses the configured filter. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCvd34632. AsyncOS Software is the operating system used in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0587", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "10.0.1-087" }, { "model": "asyncos software", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.8.1-015" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0.2-020" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "BID", "id": "98969" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance_firmware:10.0.1-087:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance_firmware:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-6671" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "98969" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ], "trust": 0.9 }, "cve": "CVE-2017-6671", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6671", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-11578", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-114874", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6671", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-6671", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-11578", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201706-373", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-114874", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "VULHUB", "id": "VHN-114874" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device, as demonstrated by the Attachment Filter. More Information: CSCvd34632. Known Affected Releases: 10.0.1-087 9.7.1-066. Known Fixed Releases: 10.0.2-020 9.8.1-015. Vendors have confirmed this vulnerability Bug ID CSCvd34632 It is released as.A remote attacker could bypass the filters set on the device. CiscoEmailSecurityAppliance is a set of email security appliances. CiscoContentSecurityManagement is a unified email and web security management solution. An email scanning vulnerability exists in CiscoAsyncOSSoftware on CiscoEmailSecurityAppliance (ESA) devices. This vulnerability stems from incorrect authentication of emails with attachments and modified MIME headers. An unauthenticated remote attacker bypasses the configured filter. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCvd34632. AsyncOS Software is the operating system used in it", "sources": [ { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "BID", "id": "98969" }, { "db": "VULHUB", "id": "VHN-114874" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6671", "trust": 3.4 }, { "db": "BID", "id": "98969", "trust": 2.6 }, { "db": "SECTRACK", "id": "1038635", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2017-004810", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201706-373", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-11578", "trust": 0.6 }, { "db": "NSFOCUS", "id": "36819", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-114874", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "VULHUB", "id": "VHN-114874" }, { "db": "BID", "id": "98969" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "id": "VAR-201706-0587", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "VULHUB", "id": "VHN-114874" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" } ] }, "last_update_date": "2023-12-18T13:38:58.994000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170607-esa1", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170607-esa1" }, { "title": "CiscoEmailSecurityAppliance Attachment Filter bypasses vulnerability patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/96511" }, { "title": "Cisco Email Security Appliance AsyncOS Software Enter the fix for the verification vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71486" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114874" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170607-esa1" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/98969" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1038635" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6671" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6671" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/36819" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "VULHUB", "id": "VHN-114874" }, { "db": "BID", "id": "98969" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-11578" }, { "db": "VULHUB", "id": "VHN-114874" }, { "db": "BID", "id": "98969" }, { "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "db": "NVD", "id": "CVE-2017-6671" }, { "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-11578" }, { "date": "2017-06-13T00:00:00", "db": "VULHUB", "id": "VHN-114874" }, { "date": "2017-06-07T00:00:00", "db": "BID", "id": "98969" }, { "date": "2017-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "date": "2017-06-13T06:29:01.097000", "db": "NVD", "id": "CVE-2017-6671" }, { "date": "2017-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-11578" }, { "date": "2017-11-27T00:00:00", "db": "VULHUB", "id": "VHN-114874" }, { "date": "2017-06-07T00:00:00", "db": "BID", "id": "98969" }, { "date": "2017-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004810" }, { "date": "2017-11-27T12:15:39.577000", "db": "NVD", "id": "CVE-2017-6671" }, { "date": "2017-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-373" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-373" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance for Cisco AsyncOS Vulnerability in software that bypasses filters configured on devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004810" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-373" } ], "trust": 0.6 } }
var-201611-0167
Vulnerability from variot
A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to use a content filter for email attachments that are protected or encrypted. More Information: CSCva52546. Known Affected Releases: 10.0.0-125 9.7.1-066. CiscoAsyncOS Remote Security Bypass Vulnerability. An attacker could exploit the vulnerability to bypass certain security mechanisms and perform unauthorized operations. This issue is being tracked by Cisco Bug ID CSCva52546
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0167", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.9_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-054" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-046" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0-124" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0.0-125 9.7.1-066" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "BID", "id": "94074" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-047:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-054:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.2-046:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-124:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.9_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.9.6-026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6458" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94074" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ], "trust": 0.9 }, "cve": "CVE-2016-6458", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6458", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10638", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95278", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6458", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6458", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10638", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201611-023", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95278", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "VULHUB", "id": "VHN-95278" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to use a content filter for email attachments that are protected or encrypted. More Information: CSCva52546. Known Affected Releases: 10.0.0-125 9.7.1-066. CiscoAsyncOS Remote Security Bypass Vulnerability. An attacker could exploit the vulnerability to bypass certain security mechanisms and perform unauthorized operations. \nThis issue is being tracked by Cisco Bug ID CSCva52546", "sources": [ { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "BID", "id": "94074" }, { "db": "VULHUB", "id": "VHN-95278" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6458", "trust": 3.4 }, { "db": "BID", "id": "94074", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037182", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201611-023", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10638", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95278", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "VULHUB", "id": "VHN-95278" }, { "db": "BID", "id": "94074" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "id": "VAR-201611-0167", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "VULHUB", "id": "VHN-95278" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" } ] }, "last_update_date": "2023-12-18T12:44:48.083000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161102-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161102-esa" }, { "title": "CiscoAsyncOS Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83550" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65247" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95278" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161102-esa" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/94074" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037182" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6458" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6458" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "VULHUB", "id": "VHN-95278" }, { "db": "BID", "id": "94074" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10638" }, { "db": "VULHUB", "id": "VHN-95278" }, { "db": "BID", "id": "94074" }, { "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "db": "NVD", "id": "CVE-2016-6458" }, { "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-07T00:00:00", "db": "CNVD", "id": "CNVD-2016-10638" }, { "date": "2016-11-19T00:00:00", "db": "VULHUB", "id": "VHN-95278" }, { "date": "2016-11-02T00:00:00", "db": "BID", "id": "94074" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "date": "2016-11-19T03:03:01.383000", "db": "NVD", "id": "CVE-2016-6458" }, { "date": "2016-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-07T00:00:00", "db": "CNVD", "id": "CNVD-2016-10638" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95278" }, { "date": "2016-11-24T01:07:00", "db": "BID", "id": "94074" }, { "date": "2016-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005909" }, { "date": "2017-07-29T01:34:18.693000", "db": "NVD", "id": "CVE-2016-6458" }, { "date": "2016-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security For appliance AsyncOS Vulnerability that bypasses the set content filter in the content filtering function", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-023" } ], "trust": 0.6 } }
var-201905-0513
Vulnerability from variot
A vulnerability in the log subscription subsystem of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The vulnerability is due to insufficient validation of user-supplied input on the web and command-line interface. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. Cisco Web Security Appliance (WSA) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Web Security Appliance is prone to local command-injection vulnerability. This issue is being tracked by Cisco Bug ID CSCvk68106. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. The log subscription subsystem is one of the log subscription subsystems. An input validation error vulnerability exists in the log subscription subsystem in Cisco WSA. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0513", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "11.0.0-641" }, { "model": "web security appliance", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10.5.2-072" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "wsa10.5.0-fcs-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5.0-fcs-614" }, { "model": "web security the appliance software", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security appliance 11.5.0-fcs-614", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.7" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.1" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7.0-406" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.2-020" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5.4-018" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.1.4-017" } ], "sources": [ { "db": "BID", "id": "108131" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.0.0-641:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:11.5.0-fcs-614:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:wsa10.5.0-fcs-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1816" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco.", "sources": [ { "db": "BID", "id": "108131" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ], "trust": 0.9 }, "cve": "CVE-2019-1816", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-1816", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-150478", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ykramarz@cisco.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-1816", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1816", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1816", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201905-021", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-150478", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-150478" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the log subscription subsystem of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The vulnerability is due to insufficient validation of user-supplied input on the web and command-line interface. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. Cisco Web Security Appliance (WSA) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Web Security Appliance is prone to local command-injection vulnerability. \nThis issue is being tracked by Cisco Bug ID CSCvk68106. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. The log subscription subsystem is one of the log subscription subsystems. An input validation error vulnerability exists in the log subscription subsystem in Cisco WSA. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "BID", "id": "108131" }, { "db": "VULHUB", "id": "VHN-150478" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1816", "trust": 2.8 }, { "db": "BID", "id": "108131", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2019-003883", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201905-021", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1520", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-150478", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-150478" }, { "db": "BID", "id": "108131" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "id": "VAR-201905-0513", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-150478" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T12:00:12.294000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190501-wsa-privesc", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-wsa-privesc" }, { "title": "Cisco Web Security Appliance Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92172" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-150478" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-wsa-privesc" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1816" }, { "trust": 0.9, "url": "http://www.cisco.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1816" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-web-security-appliance-code-execution-via-log-subscription-subsystem-29190" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/80118" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108131" } ], "sources": [ { "db": "VULHUB", "id": "VHN-150478" }, { "db": "BID", "id": "108131" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-150478" }, { "db": "BID", "id": "108131" }, { "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "db": "NVD", "id": "CVE-2019-1816" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-03T00:00:00", "db": "VULHUB", "id": "VHN-150478" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108131" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "date": "2019-05-03T17:29:00.937000", "db": "NVD", "id": "CVE-2019-1816" }, { "date": "2019-05-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-150478" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108131" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003883" }, { "date": "2023-03-24T18:14:09.223000", "db": "NVD", "id": "CVE-2019-1816" }, { "date": "2019-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108131" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Appliance Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003883" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "108131" }, { "db": "CNNVD", "id": "CNNVD-201905-021" } ], "trust": 0.9 } }
var-201610-0318
Vulnerability from variot
A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuy54740 and CSCuy75174 It is released as.A third party could bypass the filtering function. Cisco AsyncOS for Email and Web Security Appliances are products of Cisco. CiscoAsyncOSforEmailSecurityAppliances is a set of operating systems used by Cisco Systems in the E-mail Security Appliance (ESA). Cisco Web Security Appliance (WSA) is a network security appliance. A remote security bypass vulnerability exists in CiscoAsyncOSforEmail and WebSecurityAppliances. An attacker could exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. This may aid in further attacks This issue is tracked by Cisco Bug IDs CSCuy54740 and CSCuy75174
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0318", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.7" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.6" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.7.5-835" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "web security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.1.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.8.0-085" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.5" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-608" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.3-055" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-193" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.4" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.7-142" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.6.0-623" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-027" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-024" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-hp2-303" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1-021" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-825" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.1-023" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-078" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-119" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-051" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-444" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.1-000" }, { "model": "web security appliance 8.0.5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "hot_patch_1" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9_base" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-070" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.8.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.8-mr-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.1" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-284" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-235" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.2" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "BID", "id": "93911" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.9_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-235:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_8.0.5:hot_patch_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-027:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-444:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:5.6.0-623:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:6.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-608:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.2-hp2-303:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.5-835:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:9.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.3-055:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-825:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.2-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.1-021:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6372" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93911" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ], "trust": 0.9 }, "cve": "CVE-2016-6372", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-6372", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-10403", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-95192", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6372", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6372", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10403", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-748", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95192", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "VULHUB", "id": "VHN-95192" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047. Vendors have confirmed this vulnerability Bug ID CSCuy54740 and CSCuy75174 It is released as.A third party could bypass the filtering function. Cisco AsyncOS for Email and Web Security Appliances are products of Cisco. CiscoAsyncOSforEmailSecurityAppliances is a set of operating systems used by Cisco Systems in the E-mail Security Appliance (ESA). Cisco Web Security Appliance (WSA) is a network security appliance. A remote security bypass vulnerability exists in CiscoAsyncOSforEmail and WebSecurityAppliances. An attacker could exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. This may aid in further attacks\nThis issue is tracked by Cisco Bug IDs CSCuy54740 and CSCuy75174", "sources": [ { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "BID", "id": "93911" }, { "db": "VULHUB", "id": "VHN-95192" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6372", "trust": 3.4 }, { "db": "BID", "id": "93911", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037118", "trust": 1.1 }, { "db": "SECTRACK", "id": "1037119", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005652", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-748", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10403", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95192", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "VULHUB", "id": "VHN-95192" }, { "db": "BID", "id": "93911" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "id": "VAR-201610-0318", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "VULHUB", "id": "VHN-95192" } ], "trust": 1.2410863666666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" } ] }, "last_update_date": "2023-12-18T14:05:56.173000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esawsa2", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa2" }, { "title": "CiscoAsyncOSforEmail and WebSecurityAppliances Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83295" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances and Web Security Appliances Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65157" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95192" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/93911" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa2" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037118" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037119" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6372" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6372" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "VULHUB", "id": "VHN-95192" }, { "db": "BID", "id": "93911" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "VULHUB", "id": "VHN-95192" }, { "db": "BID", "id": "93911" }, { "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "db": "NVD", "id": "CVE-2016-6372" }, { "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10403" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-95192" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93911" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "date": "2016-10-28T10:59:11.387000", "db": "NVD", "id": "CVE-2016-6372" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10403" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95192" }, { "date": "2016-11-24T01:10:00", "db": "BID", "id": "93911" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005652" }, { "date": "2017-07-29T01:34:17.867000", "db": "NVD", "id": "CVE-2016-6372" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-748" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-748" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS for Email and Web Security Appliances Remote Security Bypass Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-10403" }, { "db": "BID", "id": "93911" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-748" } ], "trust": 0.6 } }
var-201511-0004
Vulnerability from variot
Cisco AsyncOS before 8.5.7-042, 9.x before 9.1.0-032, 9.1.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-042 on Email Security Appliance (ESA) devices; before 9.1.0-032, 9.1.1 before 9.1.1-005, and 9.5.x before 9.5.0-025 on Content Security Management Appliance (SMA) devices; and before 7.7.0-725 and 8.x before 8.0.8-113 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets, aka Bug IDs CSCus79774, CSCus79777, and CSCzv95795. Vendors have confirmed this vulnerability Bug ID CSCus79774 , CSCus79777 ,and CSCzv95795 It is released as.A large amount by a third party TCP Service disruption via packets ( Memory consumption ) There is a possibility of being put into a state. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. A security vulnerability exists in the Cisco AsyncOS f network stack. An attacker can exploit this issue to cause a denial-of-service condition. This issue is tracked by Cisco Bug IDs CSCus79774, CSCus79777, and CSCzv95795. The following releases are affected: Cisco AsyncOS on Cisco ESA appliances prior to 8.5.7-042, 9.x prior to 9.1.0-032, 9.1.x prior to 9.1.1-023, and 9.5 prior to 9.6.0-042. x and 9.6.x releases; Cisco AsyncOS releases prior to 9.1.0-032 on Content SMA appliances, 9.1.1 releases prior to 9.1.1-005, and 9.5.x releases prior to 9.5.0-025; Cisco AsyncOS releases on WSA appliances AsyncOS versions prior to 7.7.0-725 and versions 8.x prior to 8.0.8-113
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0004", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.9.2-116" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0-004" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.4.0-150" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.3.5-061" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1.2-000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.3.6-014" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2.0-238" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.3.0-350" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1.0-001" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-073" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.9.0-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.3-000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.8.0-328" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.1-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.1-031" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.6.0-623" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.8.0-311" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.8.1-001" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.1-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.7-010" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-825" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-000" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.1.1-033" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.5.x (sma)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.x (wsa)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-005" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.1.1 (sma)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.6.x (esa)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(wsa)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.7.0-725" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "(sma)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(sma)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.x (esa)" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "(esa)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.5.x (esa)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.1.x (esa)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(esa)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-023" }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "(wsa)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.5.0-025" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.8-113" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.5.x" }, { "model": "email security appliance", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.x(\u003c9.1.0-032)" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.1.x(\u003c9.1.1-023)" }, { "model": "email security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.6.x(\u003c9.6.0-042)" }, { "model": "content security management appliance", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.1.1(\u003c9.1.1-005)" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9.5.x(\u003c9.5.0-025)" }, { "model": "web security appliance", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "7.7.0-725" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.x(\u003c8.0.8-113)" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.8-113" }, { "model": "web security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.7.0-725" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.5.0-025" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-005" }, { "model": "content security management appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.0-032" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "BID", "id": "77434" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:6.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-825:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.2-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:7.5.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:5.6.0-623:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.1.2-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.2.0-238:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:7.8.0-328:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:7.8.1-001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.3.0-350:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.3.5-061:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:7.9.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:7.9.2-116:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.0.1-031:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.3.6-014:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.3.7-010:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.4.0-150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.1.0-001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:8.1.1-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.0.0-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.8.0-311:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:7.6.3-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6321" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "77434" } ], "trust": 0.3 }, "cve": "CVE-2015-6321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6321", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-07404", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84282", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-6321", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-07404", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-102", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84282", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "VULHUB", "id": "VHN-84282" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS before 8.5.7-042, 9.x before 9.1.0-032, 9.1.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-042 on Email Security Appliance (ESA) devices; before 9.1.0-032, 9.1.1 before 9.1.1-005, and 9.5.x before 9.5.0-025 on Content Security Management Appliance (SMA) devices; and before 7.7.0-725 and 8.x before 8.0.8-113 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets, aka Bug IDs CSCus79774, CSCus79777, and CSCzv95795. Vendors have confirmed this vulnerability Bug ID CSCus79774 , CSCus79777 ,and CSCzv95795 It is released as.A large amount by a third party TCP Service disruption via packets ( Memory consumption ) There is a possibility of being put into a state. The Cisco AsyncOS operating system enhances the security and performance of Cisco Email Security appliances. A security vulnerability exists in the Cisco AsyncOS f network stack. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is tracked by Cisco Bug IDs CSCus79774, CSCus79777, and CSCzv95795. The following releases are affected: Cisco AsyncOS on Cisco ESA appliances prior to 8.5.7-042, 9.x prior to 9.1.0-032, 9.1.x prior to 9.1.1-023, and 9.5 prior to 9.6.0-042. x and 9.6.x releases; Cisco AsyncOS releases prior to 9.1.0-032 on Content SMA appliances, 9.1.1 releases prior to 9.1.1-005, and 9.5.x releases prior to 9.5.0-025; Cisco AsyncOS releases on WSA appliances AsyncOS versions prior to 7.7.0-725 and versions 8.x prior to 8.0.8-113", "sources": [ { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "BID", "id": "77434" }, { "db": "VULHUB", "id": "VHN-84282" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6321", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034060", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034061", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005770", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-102", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07404", "trust": 0.6 }, { "db": "BID", "id": "77434", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-84282", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "VULHUB", "id": "VHN-84282" }, { "db": "BID", "id": "77434" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "id": "VAR-201511-0004", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "VULHUB", "id": "VHN-84282" } ], "trust": 1.1425819499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" } ] }, "last_update_date": "2023-12-18T13:09:09.424000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20151104-aos", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-aos" }, { "title": "Patch for Cisco AsyncOS Denial of Service Vulnerability (CNVD-2015-07404)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/66476" }, { "title": "Cisco AsyncOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58598" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84282" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151104-aos" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034060" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034061" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6321" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6321" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "VULHUB", "id": "VHN-84282" }, { "db": "BID", "id": "77434" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07404" }, { "db": "VULHUB", "id": "VHN-84282" }, { "db": "BID", "id": "77434" }, { "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "db": "NVD", "id": "CVE-2015-6321" }, { "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07404" }, { "date": "2015-11-06T00:00:00", "db": "VULHUB", "id": "VHN-84282" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77434" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "date": "2015-11-06T03:59:03.433000", "db": "NVD", "id": "CVE-2015-6321" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2015-07404" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-84282" }, { "date": "2015-11-04T00:00:00", "db": "BID", "id": "77434" }, { "date": "2015-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005770" }, { "date": "2016-12-07T18:19:29.093000", "db": "NVD", "id": "CVE-2015-6321" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-102" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-102" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security Runs on the appliance AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005770" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-102" } ], "trust": 0.6 } }
var-201701-0726
Vulnerability from variot
A vulnerability in the content scanning engine of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured message or content filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz16076. Known Affected Releases: 9.7.1-066 9.7.1-HP2-207 9.8.5-085. Known Fixed Releases: 10.0.1-083 10.0.1-087. The CiscoAsyncOSonEmailSecurityAppliance(ESA)device is a set of operating systems running on an Email Security Appliance (ESA) from Cisco. A remote security bypass vulnerability exists in CiscoEmailSecurityApplianceforAsyncOS. The attacker exploited the vulnerability to bypass security restrictions and perform unauthorized actions and launch further attacks. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuz16076
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201701-0726", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-hp2-207" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.8.5-085" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.1-hp2-207" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.8.5-085" }, { "model": "email security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "BID", "id": "95637" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.8.5-085:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-hp2-207:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-3800" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "95637" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ], "trust": 0.9 }, "cve": "CVE-2017-3800", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-3800", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-01034", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-112003", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-3800", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-3800", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-01034", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201701-779", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-112003", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "VULHUB", "id": "VHN-112003" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the content scanning engine of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured message or content filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz16076. Known Affected Releases: 9.7.1-066 9.7.1-HP2-207 9.8.5-085. Known Fixed Releases: 10.0.1-083 10.0.1-087. The CiscoAsyncOSonEmailSecurityAppliance(ESA)device is a set of operating systems running on an Email Security Appliance (ESA) from Cisco. A remote security bypass vulnerability exists in CiscoEmailSecurityApplianceforAsyncOS. The attacker exploited the vulnerability to bypass security restrictions and perform unauthorized actions and launch further attacks. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCuz16076 ", "sources": [ { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "BID", "id": "95637" }, { "db": "VULHUB", "id": "VHN-112003" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-3800", "trust": 3.4 }, { "db": "BID", "id": "95637", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037656", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2017-001386", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201701-779", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-01034", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-112003", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "VULHUB", "id": "VHN-112003" }, { "db": "BID", "id": "95637" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "id": "VAR-201701-0726", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "VULHUB", "id": "VHN-112003" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" } ] }, "last_update_date": "2023-12-18T14:05:55.267000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170118-esa", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170118-esa" }, { "title": "CiscoEmailSecurityApplianceforAsyncOS Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/88717" }, { "title": "Cisco Email Security Appliance for AsyncOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=67338" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112003" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/95637" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170118-esa" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037656" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3800" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-3800" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "VULHUB", "id": "VHN-112003" }, { "db": "BID", "id": "95637" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-01034" }, { "db": "VULHUB", "id": "VHN-112003" }, { "db": "BID", "id": "95637" }, { "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "db": "NVD", "id": "CVE-2017-3800" }, { "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-07T00:00:00", "db": "CNVD", "id": "CNVD-2017-01034" }, { "date": "2017-01-26T00:00:00", "db": "VULHUB", "id": "VHN-112003" }, { "date": "2017-01-18T00:00:00", "db": "BID", "id": "95637" }, { "date": "2017-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "date": "2017-01-26T07:59:00.513000", "db": "NVD", "id": "CVE-2017-3800" }, { "date": "2017-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-07T00:00:00", "db": "CNVD", "id": "CNVD-2017-01034" }, { "date": "2017-07-26T00:00:00", "db": "VULHUB", "id": "VHN-112003" }, { "date": "2017-01-23T02:11:00", "db": "BID", "id": "95637" }, { "date": "2017-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001386" }, { "date": "2017-07-26T01:29:05.977000", "db": "NVD", "id": "CVE-2017-3800" }, { "date": "2017-02-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-779" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-779" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security For appliance AsyncOS Vulnerability in software content scanning engine that bypasses configured message or content filtering", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001386" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-779" } ], "trust": 0.6 } }
var-201610-0341
Vulnerability from variot
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, if the software is configured with message or content filters to scan incoming email attachments. More Information: CSCuw03606, CSCux59734. Known Affected Releases: 8.0.0-000 8.5.6-106 9.0.0-000 9.1.0-032 9.6.0-042 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.1.1-038 9.7.1-066. Vendors have confirmed this vulnerability Bug ID CSCuw03606 and CSCux59734 It is released as. Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. http://cwe.mitre.org/data/definitions/388.htmlA third party may bypass user filters configured on the device. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. 0-000
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-052" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.1-023" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0-212" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.6-073" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.5.7-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.4.4-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.7.0-125" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-101" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.2-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-011" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.5-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.0-461" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-er1-198" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-113" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.6-106" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.1-000" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.9.0" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0_base" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "web security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "BID", "id": "93914" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1480" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93914" } ], "trust": 0.3 }, "cve": "CVE-2016-1480", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-1480", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-10397", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-90299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-1480", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1480", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10397", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-858", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90299", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "VULHUB", "id": "VHN-90299" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, if the software is configured with message or content filters to scan incoming email attachments. More Information: CSCuw03606, CSCux59734. Known Affected Releases: 8.0.0-000 8.5.6-106 9.0.0-000 9.1.0-032 9.6.0-042 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.1.1-038 9.7.1-066. Vendors have confirmed this vulnerability Bug ID CSCuw03606 and CSCux59734 It is released as. Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. http://cwe.mitre.org/data/definitions/388.htmlA third party may bypass user filters configured on the device. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. 0-000", "sources": [ { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "BID", "id": "93914" }, { "db": "VULHUB", "id": "VHN-90299" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1480", "trust": 3.4 }, { "db": "BID", "id": "93914", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037116", "trust": 1.1 }, { "db": "SECTRACK", "id": "1037117", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005645", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-858", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10397", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90299", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "VULHUB", "id": "VHN-90299" }, { "db": "BID", "id": "93914" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "id": "VAR-201610-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "VULHUB", "id": "VHN-90299" } ], "trust": 1.2410863666666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" } ] }, "last_update_date": "2023-12-18T13:48:45.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esawsa1", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa1" }, { "title": "Patch for CiscoAsyncOS Security Bypass Vulnerability (CNVD-2016-10397)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83246" }, { "title": "Cisco AsyncOS for Cisco Email Security Appliances and Web Security Appliances Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65180" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-388", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90299" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esawsa1" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/93914" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037116" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037117" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1480" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1480" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "VULHUB", "id": "VHN-90299" }, { "db": "BID", "id": "93914" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10397" }, { "db": "VULHUB", "id": "VHN-90299" }, { "db": "BID", "id": "93914" }, { "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "db": "NVD", "id": "CVE-2016-1480" }, { "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10397" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-90299" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93914" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "date": "2016-10-28T10:59:01.993000", "db": "NVD", "id": "CVE-2016-1480" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10397" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-90299" }, { "date": "2016-11-24T00:11:00", "db": "BID", "id": "93914" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005645" }, { "date": "2017-07-29T01:34:07.367000", "db": "NVD", "id": "CVE-2016-1480" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-858" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-858" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ESA and WSA Run on AsyncOS of MIME Vulnerability in the scanner that bypasses the user filter set on the device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005645" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-858" } ], "trust": 0.6 } }
var-201410-1000
Vulnerability from variot
The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934. Vendors have confirmed this vulnerability Bug ID CSCup07934 It is released as.A third party may be able to bypass malware filtering through a crafted archive. Cisco AsyncOS is the operating system used by multiple Cisco products. A remote security bypass vulnerability exists in Cisco AsyncOS Software that allows an attacker to bypass certain security restrictions and perform unauthorized operations. Cisco AsyncOS Software is prone to a remote security-bypass vulnerability. This issue is being tracked by Cisco Bug ID CSCup07934. The vulnerability is caused by the program not correctly parsing ZIP compressed files
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201410-1000", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "lte", "trust": 1.8, "vendor": "cisco", "version": "8.5" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.5", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3381" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "70414" } ], "trust": 0.3 }, "cve": "CVE-2014-3381", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-3381", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-06731", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-71321", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3381", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-06731", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201410-631", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71321", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "VULHUB", "id": "VHN-71321" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934. Vendors have confirmed this vulnerability Bug ID CSCup07934 It is released as.A third party may be able to bypass malware filtering through a crafted archive. Cisco AsyncOS is the operating system used by multiple Cisco products. A remote security bypass vulnerability exists in Cisco AsyncOS Software that allows an attacker to bypass certain security restrictions and perform unauthorized operations. Cisco AsyncOS Software is prone to a remote security-bypass vulnerability. \nThis issue is being tracked by Cisco Bug ID CSCup07934. The vulnerability is caused by the program not correctly parsing ZIP compressed files", "sources": [ { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "BID", "id": "70414" }, { "db": "VULHUB", "id": "VHN-71321" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3381", "trust": 3.4 }, { "db": "BID", "id": "70414", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-004983", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-631", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-06731", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-71321", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "VULHUB", "id": "VHN-71321" }, { "db": "BID", "id": "70414" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "id": "VAR-201410-1000", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "VULHUB", "id": "VHN-71321" } ], "trust": 1.4380951999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" } ] }, "last_update_date": "2023-12-18T12:57:54.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3381" }, { "title": "36062", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36062" }, { "title": "Cisco AsyncOS Software Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/50828" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71321" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3381" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36062" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3381" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3381" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/70414" }, { "trust": 0.3, "url": "www.cisco.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "VULHUB", "id": "VHN-71321" }, { "db": "BID", "id": "70414" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-06731" }, { "db": "VULHUB", "id": "VHN-71321" }, { "db": "BID", "id": "70414" }, { "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "db": "NVD", "id": "CVE-2014-3381" }, { "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-15T00:00:00", "db": "CNVD", "id": "CNVD-2014-06731" }, { "date": "2014-10-19T00:00:00", "db": "VULHUB", "id": "VHN-71321" }, { "date": "2014-10-13T00:00:00", "db": "BID", "id": "70414" }, { "date": "2014-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "date": "2014-10-19T01:55:13.607000", "db": "NVD", "id": "CVE-2014-3381" }, { "date": "2014-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-15T00:00:00", "db": "CNVD", "id": "CNVD-2014-06731" }, { "date": "2014-10-22T00:00:00", "db": "VULHUB", "id": "VHN-71321" }, { "date": "2014-10-15T16:03:00", "db": "BID", "id": "70414" }, { "date": "2014-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004983" }, { "date": "2014-10-22T19:04:30.970000", "db": "NVD", "id": "CVE-2014-3381" }, { "date": "2014-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-631" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-631" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance Run on Cisco AsyncOS of ZIP Vulnerabilities that can bypass malware filtering in the inspection engine", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004983" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-631" } ], "trust": 0.6 } }
var-201605-0557
Vulnerability from variot
Cisco AsyncOS before 8.5.3-069 and 8.6 through 8.8 on Web Security Appliance (WSA) devices mishandles memory allocation for HTTP requests, which allows remote attackers to cause a denial of service (proxy-process reload) via a crafted request, aka Bug ID CSCuu02529. Vendors have confirmed this vulnerability Bug ID CSCuu02529 It is released as.Service disruption through a crafted request by a third party ( Proxy process reload ) There is a possibility of being put into a state. Cisco AsyncOS for Cisco Web Security Appliance is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuu02529. Cisco WSA AsyncOS before 8.5.3-069 and versions 8.6 to 8.8 have a security vulnerability in the HTTP request parsing. The vulnerability is caused by the program not correctly allocating space for the HTTP header and HTTP payload
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.2-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1-021" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-825" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.8-mr-113" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0.000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.3-055" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.7.1-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.1" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.0" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.5.1-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.4" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.3" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.6.0-623" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.2" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.7-142" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.0-497" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-027" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.7" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.2-024" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.5" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0-000" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-078" }, { "model": "web security appliance \\", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.6-119" }, { "model": "web security the appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.5.3-069" }, { "model": "web security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6 to 8.8" }, { "model": "web security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3-010" } ], "sources": [ { "db": "BID", "id": "90746" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):6.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):5.6.0-623:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.0-497:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.0.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.3-055:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6-119:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.2-024:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.7.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.1-021:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.7.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.7-142:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.8-mr-113:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.0-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.1-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.2-000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.5.0-825:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.6-078:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):8.5.2-027:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance_\\(wsa\\):7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1382" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "90746" } ], "trust": 0.3 }, "cve": "CVE-2016-1382", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1382", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90201", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-1382", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1382", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-464", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90201", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-90201" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco AsyncOS before 8.5.3-069 and 8.6 through 8.8 on Web Security Appliance (WSA) devices mishandles memory allocation for HTTP requests, which allows remote attackers to cause a denial of service (proxy-process reload) via a crafted request, aka Bug ID CSCuu02529. Vendors have confirmed this vulnerability Bug ID CSCuu02529 It is released as.Service disruption through a crafted request by a third party ( Proxy process reload ) There is a possibility of being put into a state. Cisco AsyncOS for Cisco Web Security Appliance is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCuu02529. Cisco WSA AsyncOS before 8.5.3-069 and versions 8.6 to 8.8 have a security vulnerability in the HTTP request parsing. The vulnerability is caused by the program not correctly allocating space for the HTTP header and HTTP payload", "sources": [ { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "BID", "id": "90746" }, { "db": "VULHUB", "id": "VHN-90201" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1382", "trust": 2.8 }, { "db": "SECTRACK", "id": "1035910", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002923", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-464", "trust": 0.7 }, { "db": "BID", "id": "90746", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-90201", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90201" }, { "db": "BID", "id": "90746" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "id": "VAR-201605-0557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-90201" } ], "trust": 0.54624132 }, "last_update_date": "2023-12-18T13:57:33.388000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160518-wsa3", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa3" }, { "title": "Cisco Web Security Appliance AsyncOS Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61778" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90201" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa3" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035910" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1382" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1382" }, { "trust": 0.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160518-wsa3/" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90201" }, { "db": "BID", "id": "90746" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-90201" }, { "db": "BID", "id": "90746" }, { "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "db": "NVD", "id": "CVE-2016-1382" }, { "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-25T00:00:00", "db": "VULHUB", "id": "VHN-90201" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90746" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "date": "2016-05-25T01:59:06.020000", "db": "NVD", "id": "CVE-2016-1382" }, { "date": "2016-05-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-01T00:00:00", "db": "VULHUB", "id": "VHN-90201" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90746" }, { "date": "2016-05-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002923" }, { "date": "2016-12-01T03:05:25.790000", "db": "NVD", "id": "CVE-2016-1382" }, { "date": "2016-05-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-464" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-464" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Web Security Runs on the appliance device AsyncOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002923" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-464" } ], "trust": 0.6 } }
var-201801-1046
Vulnerability from variot
A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726. Vendors have confirmed this vulnerability Bug ID CSCvb34303 and CSCvb35726 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco AsyncOS is an operating system used in these products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-1046", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.1-005" }, { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-065" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0.0-085" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.7.0-006" } ], "sources": [ { "db": "BID", "id": "102729" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.1.1-005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:9.7.2-065:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0095" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "102729" } ], "trust": 0.3 }, "cve": "CVE-2018-0095", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0095", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118297", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0095", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0095", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201801-624", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118297", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118297" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726. Vendors have confirmed this vulnerability Bug ID CSCvb34303 and CSCvb35726 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco AsyncOS is an operating system used in these products", "sources": [ { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "BID", "id": "102729" }, { "db": "VULHUB", "id": "VHN-118297" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0095", "trust": 2.8 }, { "db": "BID", "id": "102729", "trust": 2.0 }, { "db": "SECTRACK", "id": "1040222", "trust": 1.7 }, { "db": "SECTRACK", "id": "1040221", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-001507", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201801-624", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-118297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118297" }, { "db": "BID", "id": "102729" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "id": "VAR-201801-1046", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118297" } ], "trust": 0.53892258 }, "last_update_date": "2023-12-18T12:19:10.723000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180117-esasma", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180117-esasma" }, { "title": "Cisco Email Security Appliance and Content Security Management Appliance Cisco AsyncOS Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77804" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118297" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180117-esasma" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102729" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1040221" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1040222" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0095" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0095" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118297" }, { "db": "BID", "id": "102729" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118297" }, { "db": "BID", "id": "102729" }, { "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "db": "NVD", "id": "CVE-2018-0095" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-118297" }, { "date": "2018-01-17T00:00:00", "db": "BID", "id": "102729" }, { "date": "2018-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "date": "2018-01-18T06:29:00.753000", "db": "NVD", "id": "CVE-2018-0095" }, { "date": "2018-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118297" }, { "date": "2018-01-17T00:00:00", "db": "BID", "id": "102729" }, { "date": "2018-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001507" }, { "date": "2019-10-09T23:31:13.270000", "db": "NVD", "id": "CVE-2018-0095" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-624" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "102729" }, { "db": "CNNVD", "id": "CNNVD-201801-624" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance and Content Security Management Appliance of Cisco AsyncOS Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001507" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-624" } ], "trust": 0.6 } }
var-201610-0319
Vulnerability from variot
A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. More Information: CSCux68539. Known Affected Releases: 9.1.0-032 9.7.1-000. Known Fixed Releases: 9.1.1-038. Vendors have confirmed this vulnerability Bug CSCux68539 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. Cisco Email Security Appliance is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCux68539. The appliance offers spam protection, email encryption, data loss prevention, and more. A denial of service vulnerability exists in Cisco ESA versions 9.1.0-032 and 9.7.1-000
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0319", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-047" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.9_base" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-054" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.2-046" }, { "model": "e email security the appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.1.1-038" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "BID", "id": "93905" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.2-054:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.2-046:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.9_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6358" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93905" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ], "trust": 0.9 }, "cve": "CVE-2016-6358", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6358", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95178", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6358", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6358", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-754", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95178", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-95178" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. More Information: CSCux68539. Known Affected Releases: 9.1.0-032 9.7.1-000. Known Fixed Releases: 9.1.1-038. Vendors have confirmed this vulnerability Bug CSCux68539 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. Cisco Email Security Appliance is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCux68539. The appliance offers spam protection, email encryption, data loss prevention, and more. A denial of service vulnerability exists in Cisco ESA versions 9.1.0-032 and 9.7.1-000", "sources": [ { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "BID", "id": "93905" }, { "db": "VULHUB", "id": "VHN-95178" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6358", "trust": 2.8 }, { "db": "BID", "id": "93905", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037115", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005650", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-754", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-95178", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95178" }, { "db": "BID", "id": "93905" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "id": "VAR-201610-0319", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-95178" } ], "trust": 0.53892258 }, "last_update_date": "2023-12-18T12:37:41.784000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa6", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa6" }, { "title": "Cisco Email Security Appliance Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65110" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95178" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa6" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/93905" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037115" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6358" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6358" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-95178" }, { "db": "BID", "id": "93905" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-95178" }, { "db": "BID", "id": "93905" }, { "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "db": "NVD", "id": "CVE-2016-6358" }, { "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-95178" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93905" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "date": "2016-10-28T10:59:09.197000", "db": "NVD", "id": "CVE-2016-6358" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95178" }, { "date": "2016-11-24T00:04:00", "db": "BID", "id": "93905" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005650" }, { "date": "2017-07-29T01:34:17.773000", "db": "NVD", "id": "CVE-2016-6358" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-754" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-754" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Appliance local FTP Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005650" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-754" } ], "trust": 0.6 } }
var-201610-0317
Vulnerability from variot
A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026. Vendors have confirmed this vulnerability Bug CSCuz01651 It is released as. Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. Cisco AsyncOS has a security bypass vulnerability that allows an attacker to exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuz01651. The appliance offers spam protection, email encryption, data loss prevention, and more. The following releases are affected: Cisco ESA 10.0.9-015, 9.7.1-066, 9.9.6-026
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.7.1-066" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.9.6-026" }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "BID", "id": "93909" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6357" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "93909" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ], "trust": 0.9 }, "cve": "CVE-2016-6357", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-6357", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-10396", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-95177", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6357", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6357", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10396", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-750", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95177", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "VULHUB", "id": "VHN-95177" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026. Vendors have confirmed this vulnerability Bug CSCuz01651 It is released as. Supplementary information : CWE Vulnerability type by CWE-388: Error Handling ( Error handling ) Has been identified. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. Cisco AsyncOS has a security bypass vulnerability that allows an attacker to exploit the vulnerability to bypass certain security restrictions and perform unauthorized operations. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCuz01651. The appliance offers spam protection, email encryption, data loss prevention, and more. The following releases are affected: Cisco ESA 10.0.9-015, 9.7.1-066, 9.9.6-026", "sources": [ { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "BID", "id": "93909" }, { "db": "VULHUB", "id": "VHN-95177" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6357", "trust": 3.4 }, { "db": "BID", "id": "93909", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037114", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005649", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-750", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10396", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95177", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "VULHUB", "id": "VHN-95177" }, { "db": "BID", "id": "93909" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "id": "VAR-201610-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "VULHUB", "id": "VHN-95177" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" } ] }, "last_update_date": "2023-12-18T13:09:01.527000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161026-esa5", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa5" }, { "title": "Patch for CiscoAsyncOS Security Bypass Vulnerability (CNVD-2016-10396)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83245" }, { "title": "Cisco Email Security Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65106" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-388", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95177" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/93909" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa5" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037114" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6357" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6357" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "VULHUB", "id": "VHN-95177" }, { "db": "BID", "id": "93909" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10396" }, { "db": "VULHUB", "id": "VHN-95177" }, { "db": "BID", "id": "93909" }, { "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "db": "NVD", "id": "CVE-2016-6357" }, { "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10396" }, { "date": "2016-10-28T00:00:00", "db": "VULHUB", "id": "VHN-95177" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93909" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "date": "2016-10-28T10:59:07.917000", "db": "NVD", "id": "CVE-2016-6357" }, { "date": "2016-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2016-10396" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95177" }, { "date": "2016-11-24T11:03:00", "db": "BID", "id": "93909" }, { "date": "2016-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005649" }, { "date": "2017-07-29T01:34:17.727000", "db": "NVD", "id": "CVE-2016-6357" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-750" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-750" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Runs on the appliance AsyncOS Vulnerabilities in which filter drop settings can be bypassed", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005649" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-750" } ], "trust": 0.6 } }
var-202009-0513
Vulnerability from variot
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA. AsyncOS Software is a set of operating systems running on it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-0513", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.1.0-131" }, { "model": "asyncos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1.0-085" }, { "model": "cisco e \u30e1\u30fc\u30eb \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco asyncos", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "email security appliance asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "12.1.0-085" }, { "model": "email security appliance asyncos software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "11.1.0-131" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-131:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:12.1.0-085:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1947" } ] }, "cve": "CVE-2019-1947", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1947", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-14325", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-151919", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1947", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1947", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1947", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-14325", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-987", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-151919", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA. AsyncOS Software is a set of operating systems running on it", "sources": [ { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1947", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-011708", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-987", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-14325", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0619", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-151919", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "id": "VAR-202009-0513", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" } ], "trust": 1.41946129 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" } ] }, "last_update_date": "2023-12-18T13:12:50.803000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20200219-esa-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200219-esa-dos" }, { "title": "Patch for Cisco Email Security Appliance AsyncOS Input Validation Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/205521" }, { "title": "Cisco Email Security Appliance AsyncOS Software Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=110239" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151919" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200219-esa-dos" }, { "trust": 1.2, "url": "https://vigilance.fr/vulnerability/cisco-esa-infinite-loop-via-large-email-attachments-31638" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1947" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0619/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-14325" }, { "db": "VULHUB", "id": "VHN-151919" }, { "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "db": "NVD", "id": "CVE-2019-1947" }, { "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-14325" }, { "date": "2020-09-23T00:00:00", "db": "VULHUB", "id": "VHN-151919" }, { "date": "2021-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "date": "2020-09-23T01:15:14.520000", "db": "NVD", "id": "CVE-2019-1947" }, { "date": "2020-02-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-14325" }, { "date": "2020-10-01T00:00:00", "db": "VULHUB", "id": "VHN-151919" }, { "date": "2021-04-12T06:09:00", "db": "JVNDB", "id": "JVNDB-2020-011708" }, { "date": "2020-10-01T14:55:38.583000", "db": "NVD", "id": "CVE-2019-1947" }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco\u00a0Email\u00a0Security\u00a0Appliance\u00a0 for \u00a0Cisco\u00a0AsyncOS\u00a0 Software input verification vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011708" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-987" } ], "trust": 0.6 } }
var-201403-0465
Vulnerability from variot
The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118. The Cisco IronPort family of products is a widely used mail encryption gateway, and AsyncOS is the operating system used by the product. Cisco AsyncOS Software is prone to a remote code-execution vulnerability. An attacker can leverage this issue to execute arbitrary code with root privileges. Failed exploit attempts will likely result in denial-of-service conditions. This issue is tracked by Cisco BugId's CSCug79377, and CSCug80118. End User Safelist/Blocklist (aka SLBL ) service has a security vulnerability, which stems from the fact that the program does not fully verify the SLBL database file
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0465", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.1" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1" }, { "model": "ironport asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0" }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.6.2-201" }, { "model": "email security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "content security management appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.9.1-039" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.6.3-023" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.x (*1)" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.x (*2)" }, { "model": "e email security the appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.9.1-110" }, { "model": "content security management appliance", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*2)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.0.1-023" }, { "model": "asyncos", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(*1)" }, { "model": "asyncos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1.1-013" }, { "model": "ironport asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.9.1-039" }, { "model": "ironport asyncos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.6.2-201" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.9.1-039", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.6.2-201", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ironport_asyncos:8.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2119" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "66309" } ], "trust": 0.3 }, "cve": "CVE-2014-2119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.5, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-2119", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CNVD-2014-01906", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "VHN-70058", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2119", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-01906", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201403-387", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-70058", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "VULHUB", "id": "VHN-70058" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118. The Cisco IronPort family of products is a widely used mail encryption gateway, and AsyncOS is the operating system used by the product. Cisco AsyncOS Software is prone to a remote code-execution vulnerability. \nAn attacker can leverage this issue to execute arbitrary code with root privileges. Failed exploit attempts will likely result in denial-of-service conditions. \nThis issue is tracked by Cisco BugId\u0027s CSCug79377, and CSCug80118. End User Safelist/Blocklist (aka SLBL ) service has a security vulnerability, which stems from the fact that the program does not fully verify the SLBL database file", "sources": [ { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "BID", "id": "66309" }, { "db": "VULHUB", "id": "VHN-70058" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2119", "trust": 3.4 }, { "db": "BID", "id": "66309", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-001748", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201403-387", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-01906", "trust": 0.6 }, { "db": "CISCO", "id": "20140319 CISCO ASYNCOS SOFTWARE CODE EXECUTION VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-70058", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "VULHUB", "id": "VHN-70058" }, { "db": "BID", "id": "66309" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "id": "VAR-201403-0465", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "VULHUB", "id": "VHN-70058" } ], "trust": 1.19887304 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" } ] }, "last_update_date": "2023-12-18T13:19:59.594000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20140319-asyncos", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140319-asyncos" }, { "title": "33309", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=33309" }, { "title": "cisco-sa-20140319-asyncos", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/112/1122/1122225_cisco-sa-20140319-asyncos-j.html" }, { "title": "Cisco AsyncOS Software \u0027Safelist/Blocklist (SLBL)\u0027 Function Remote Code Execution Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/44475" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70058" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140319-asyncos" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2119" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2119" }, { "trust": 0.6, "url": "http://tools.cisco.com/security/center/viewipssignature.x?signatureid=3889\u0026signaturesubid=0\u0026softwareversion=6.0\u0026releaseversion=s778" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "VULHUB", "id": "VHN-70058" }, { "db": "BID", "id": "66309" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-01906" }, { "db": "VULHUB", "id": "VHN-70058" }, { "db": "BID", "id": "66309" }, { "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "db": "NVD", "id": "CVE-2014-2119" }, { "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-03-24T00:00:00", "db": "CNVD", "id": "CNVD-2014-01906" }, { "date": "2014-03-21T00:00:00", "db": "VULHUB", "id": "VHN-70058" }, { "date": "2014-03-19T00:00:00", "db": "BID", "id": "66309" }, { "date": "2014-03-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "date": "2014-03-21T01:04:02.937000", "db": "NVD", "id": "CVE-2014-2119" }, { "date": "2014-03-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-03-24T00:00:00", "db": "CNVD", "id": "CNVD-2014-01906" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-70058" }, { "date": "2014-03-19T00:00:00", "db": "BID", "id": "66309" }, { "date": "2014-03-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001748" }, { "date": "2018-10-30T16:27:22.513000", "db": "NVD", "id": "CVE-2014-2119" }, { "date": "2014-03-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-387" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201403-387" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Security The appliance for Cisco AsyncOS In root Vulnerability to execute arbitrary code with privileges", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001748" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201403-387" } ], "trust": 0.6 } }
var-201501-0215
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113. Vendors have confirmed this vulnerability Bug ID CSCus22925 and CSCup08113 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. Cisco AsyncOS is Cisco's custom operating system for the performance and security of all messaging applications. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug IDs CSCus22925 and CSCup08113. Cisco AsyncOS is an operating system used in these products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0577" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "72056" } ], "trust": 0.3 }, "cve": "CVE-2015-0577", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0577", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-00429", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-78523", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0577", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-00429", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201501-303", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78523", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113. Vendors have confirmed this vulnerability Bug ID CSCus22925 and CSCup08113 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. Cisco AsyncOS is Cisco\u0027s custom operating system for the performance and security of all messaging applications. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCus22925 and CSCup08113. Cisco AsyncOS is an operating system used in these products", "sources": [ { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "BID", "id": "72056" }, { "db": "VULHUB", "id": "VHN-78523" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0577", "trust": 3.4 }, { "db": "BID", "id": "72056", "trust": 2.0 }, { "db": "SECUNIA", "id": "62289", "trust": 1.1 }, { "db": "SECTRACK", "id": "1031544", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-001039", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201501-303", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-00429", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78523", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "id": "VAR-201501-0215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" } ] }, "last_update_date": "2023-12-18T14:06:05.843000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS ISQ XSS Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0577" }, { "title": "Cisco AsyncOS has multiple patches for cross-site scripting vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/54144" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78523" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0577" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/72056" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031544" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62289" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0577" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0577" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/content-security-management-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-20T00:00:00", "db": "CNVD", "id": "CNVD-2015-00429" }, { "date": "2015-01-14T00:00:00", "db": "VULHUB", "id": "VHN-78523" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72056" }, { "date": "2015-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "date": "2015-01-14T19:59:01.600000", "db": "NVD", "id": "CVE-2015-0577" }, { "date": "2015-01-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-20T00:00:00", "db": "CNVD", "id": "CNVD-2015-00429" }, { "date": "2017-09-08T00:00:00", "db": "VULHUB", "id": "VHN-78523" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72056" }, { "date": "2015-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "date": "2017-09-08T01:29:44.873000", "db": "NVD", "id": "CVE-2015-0577" }, { "date": "2015-01-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201501-303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Appliance and content Used by Security Management appliance AsyncOS Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001039" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201501-303" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3A8C94-CD5C-4309-8F1B-B151B3D091CC", "versionEndExcluding": "12.5.3-035", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE1DE406-EA9E-40DD-B18B-C19DF63EC13B", "versionEndExcluding": "13.0.0-030", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "39DEA2BD-4772-4F8D-9CD2-1BB377ECF64B", "versionEndExcluding": "13.5.3-010", "versionStartIncluding": "13.5", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDC1BE-F1C3-4030-82CE-38D99DC30B5B", "versionEndExcluding": "11.8.3-021", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC6572-4281-45E1-9B33-6993B45E6B4F", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA889DAF-1699-4A22-8A4C-D589F7BF10A8", "versionEndExcluding": "12.5.1-043", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests." }, { "lang": "es", "value": "Una vulnerabilidad en la integraci\u00f3n de Cisco Advanced Malware Protection (AMP) for Endpoints de Cisco AsyncOS para Cisco Email Security Appliance (ESA) y Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto no autenticado interceptar el tr\u00e1fico entre un dispositivo afectado y los servidores AMP. Esta vulnerabilidad es debido a una comprobaci\u00f3n inapropiada del certificado cuando un dispositivo afectado establece conexiones TLS. Un atacante tipo \"man-in-the-middle\" podr\u00eda explotar esta vulnerabilidad mediante el envio de un paquete TLS dise\u00f1ado a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante falsificar un host confiable y luego extraer informaci\u00f3n confidencial o alterar determinadas peticiones de la API" } ], "id": "CVE-2021-1566", "lastModified": "2024-11-21T05:44:38.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T18:15:08.710", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-296" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F31D03FB-191E-4D15-8AD0-EAD1CBC52225", "versionEndExcluding": "13.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device.\r\n The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email." } ], "id": "CVE-2020-26082", "lastModified": "2024-11-21T05:19:12.007", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-04T21:15:10.787", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/100681 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039288 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100681 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039288 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de detecci\u00f3n de malware en Advanced Malware Protection (AMP) de Cisco AsyncOS Software para Cisco Email Security Appliances (ESAs) podr\u00eda permitir que un atacante remoto no autenticado env\u00ede un archivo adjunto con malware en un email a un usuario final. Esta vulnerabilidad se debe al fallo de AMP en escanear ciertos archivos adjuntos EML que pudieran contener malware. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un email con un adjunto EML manipulado al dispositivo objetivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante omita el filtrado de contenidos y de mensajes de email ESA configurado y dar lugar a que el malware se entregue al usuario final. Productos vulnerables: Esta vulnerabilidad afecta a Cisco AsyncOS Software para Cisco ESA, tanto para m\u00e1quinas virtuales como f\u00edsicas, que est\u00e1n configuradas con filtros de contenidos y mensajes para escanear los archivos de email adjuntos entrantes en los Email Security Appliances. Cisco Bug IDs: CSCuz81533." } ], "id": "CVE-2017-12218", "lastModified": "2024-11-21T03:09:03.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-07T21:29:00.410", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100681" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039288" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | email_security_appliance | 11.1.0-131 | |
cisco | asyncos | 12.1.0-085 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-131:*:*:*:*:*:*:*", "matchCriteriaId": "F1928AAB-6EEC-44A0-86F5-7D96F761B768", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.1.0-085:*:*:*:*:*:*:*", "matchCriteriaId": "AAE5D24B-BB6A-40F6-92F0-977982C4E3DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado causar que la utilizaci\u00f3n de la CPU aumente al 100 por ciento, causando una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido al manejo inapropiado de los mensajes de correo electr\u00f3nico que contienen archivos adjuntos de gran tama\u00f1o.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje de correo electr\u00f3nico malicioso por medio del dispositivo apuntado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una condici\u00f3n de DoS permanente debido a la alta utilizaci\u00f3n de la CPU.\u0026#xa0;Esta vulnerabilidad puede requerir una intervenci\u00f3n manual para recuperar el ESA" } ], "id": "CVE-2019-1947", "lastModified": "2024-11-21T04:37:44.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:14.520", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F123F722-4765-49AE-AFE7-C889F3658C57", "versionEndExcluding": "14.0.4", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "23EC2FAD-D9BF-450F-989E-ED862E263F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "id": "CVE-2022-20952", "lastModified": "2024-11-21T06:43:54.277", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-01T08:15:10.270", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c160:-:*:*:*:*:*:*:*", "matchCriteriaId": "50009089-506D-42B4-B34D-CFC719B0395B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8ED62C8-2B7E-47CA-BE16-00E02CA72763", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370d:-:*:*:*:*:*:*:*", "matchCriteriaId": "93AF10FC-7988-446F-86E6-8A4E90762DA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c670:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1149EA5-37D0-4E1F-803D-A7A0658653FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_x1070:-:*:*:*:*:*:*:*", "matchCriteriaId": "E312DF25-A961-4682-B374-4A394431F8E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.\r\n\r This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en el mecanismo de filtrado de URL del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir que un atacante remoto no autenticado evite los filtros de reputaci\u00f3n de URL en un dispositivo afectado. Esta vulnerabilidad se debe a un procesamiento inadecuado de las URL. Un atacante podr\u00eda aprovechar esta vulnerabilidad creando una URL de una manera particular. Un exploit exitoso podr\u00eda permitir al atacante eludir los filtros de reputaci\u00f3n de URL configurados para un dispositivo afectado, lo que podr\u00eda permitir que URL maliciosas pasen a trav\u00e9s del dispositivo." } ], "id": "CVE-2023-20057", "lastModified": "2024-11-21T07:40:27.190", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 0.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-20T07:15:17.377", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-792" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 | Vendor Advisory | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1030258 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030258 | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | - | |
cisco | content_security_management_appliance | - | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "60635EC8-9AFA-400D-A919-66E60CDEF852", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085." }, { "lang": "es", "value": "Cisco AsyncOS en dispositivos Email Security Appliance (ESA) y Content Security Management Appliance (SMA), cuando Active Directory est\u00e1 habilitado, no maneja debidamente nombres de grupos, lo que permite a atacantes remotos ganar privilegios de rol mediante el aprovechamiento de similaridades entre nombres de grupos, tambi\u00e9n conocido como Bug ID CSCum86085." } ], "id": "CVE-2014-2195", "lastModified": "2024-11-21T02:05:49.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-20T11:13:37.593", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1030258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1030258" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 11.7.0-406 | |
cisco | asyncos | 11.7.0-418 | |
cisco | asyncos | 11.7.1-006 | |
cisco | asyncos | 11.7.1-020 | |
cisco | asyncos | 11.7.1-049 | |
cisco | asyncos | 11.7.2-011 | |
cisco | asyncos | 11.8.0-414 | |
cisco | asyncos | 11.8.1-023 | |
cisco | asyncos | 11.8.3-018 | |
cisco | asyncos | 11.8.3-021 | |
cisco | asyncos | 12.0.1-268 | |
cisco | asyncos | 12.0.3-007 | |
cisco | asyncos | 12.5.1-011 | |
cisco | asyncos | 12.5.2-007 | |
cisco | asyncos | 12.5.4-005 | |
cisco | asyncos | 12.5.5-004 | |
cisco | asyncos | 14.0.2-012 | |
cisco | asyncos | 14.0.3-014 | |
cisco | asyncos | 14.0.4-005 | |
cisco | asyncos | 14.5.0-498 | |
cisco | asyncos | 14.5.1-008 | |
cisco | asyncos | 14.5.1-016 | |
cisco | s195 | - | |
cisco | s395 | - | |
cisco | s695 | - | |
cisco | web_security_appliance_s170 | - | |
cisco | web_security_appliance_s190 | - | |
cisco | web_security_appliance_s380 | - | |
cisco | web_security_appliance_s390 | - | |
cisco | web_security_appliance_s680 | - | |
cisco | web_security_appliance_s690 | - | |
cisco | web_security_appliance_s690x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*", "matchCriteriaId": "A7A3D131-5E67-484E-93FA-BFF303019F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "12FFA6C7-9B30-4D17-8AB6-523776611524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*", "matchCriteriaId": "93F2A8D1-E9B1-4D01-B0EB-25B5E3A40B89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*", "matchCriteriaId": "0A13BA0C-9511-4522-BC82-702E0BE73C98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*", "matchCriteriaId": "2897D754-3B0B-4C18-8346-70CF2BE350A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*", "matchCriteriaId": "40D30CE8-84FA-4D81-9996-C07FD757B6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "matchCriteriaId": "DDF27FDC-ADC4-4C98-8A49-DAD2471F8301", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "matchCriteriaId": "02072E0E-BC8C-4992-AB4D-BDE5829169A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "matchCriteriaId": "67213820-8CF2-4C0E-8BE8-801FD01A97C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "matchCriteriaId": "2281D49F-6C3F-4B09-AFB4-707253876591", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D5632-1951-4DB7-9B56-4D1947E09ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "matchCriteriaId": "8F221598-29D1-4B13-A427-315F93BD9865", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "matchCriteriaId": "A2D22A3C-16D5-4F61-AB44-111F4A4D9F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "matchCriteriaId": "8C79D794-0BA9-4A55-B843-FBF9B7374095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "BBE6E431-7859-4E92-88C5-C85DADC8A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "matchCriteriaId": "495A2286-32A3-4F86-9D14-A1561FCE418A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "matchCriteriaId": "50BAC418-1CA1-4DB7-8B54-E4754A35F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "matchCriteriaId": "A3A1AE33-A44E-422C-BBF3-FEF0BD24081D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "matchCriteriaId": "D5A91305-1002-4717-AB81-A98C9C30CEA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "matchCriteriaId": "60A56580-C34C-4E5D-B053-9D02F8DD9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "matchCriteriaId": "89DC9472-A8C0-41CB-99DE-B0E160157B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "matchCriteriaId": "78109D4E-9FAA-4B5A-96E4-6D30D3458BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*", "matchCriteriaId": "E401F29A-026F-4097-B513-47911CB3AA09", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3B097B-F689-4886-A0C6-B71ECAD783CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C3AECC-9270-42B5-A36E-208AA0B48D93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5290B9CF-CF7D-4762-B5EE-5DAEA03C6409", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE85462C-079B-4488-AB0E-989D41EB7AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A8E5E8-8361-4BC8-BFA9-CAE4745A9C48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBEAFE16-BD4F-4538-9A06-173FB678DB8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked.\r\n\r This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device." } ], "id": "CVE-2023-20215", "lastModified": "2024-11-21T07:40:54.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-03T22:15:11.513", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-202" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | content_security_management_appliance | 11.4.0-812 | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | email_security_appliance | 11.0.1-hp5-602 | |
cisco | email_security_appliance | 11.1.0-404 | |
cisco | asyncos | * | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance:11.4.0-812:*:*:*:*:*:*:*", "matchCriteriaId": "81DCBF8D-3CE7-430F-A12D-4469FB18433E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C2DF32-0AC3-4AD9-B694-10415A3DE1AF", "versionEndExcluding": "11.0.1-161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF718934-B8EC-4412-B94D-84375546997A", "versionEndIncluding": "12.5.0-633", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.0.1-hp5-602:*:*:*:*:*:*:*", "matchCriteriaId": "EC1116D0-741E-4E64-BA4A-A1A58EF8C583", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.1.0-404:*:*:*:*:*:*:*", "matchCriteriaId": "DC71A74D-98EC-4D52-9C57-36B0C38530DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B1E5FC6-C1BC-43BF-A86D-C75A9E9EDA3A", "versionEndExcluding": "11.0.3-251", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AEAEC6-0E7A-4A10-8169-1E6DBC359390", "versionEndExcluding": "12.5.0-059", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA) y Cisco Content Security Management Appliance (SMA), podr\u00eda permitir a un atacante remoto no autenticado causar bloqueos repetidos en algunos procesos internos que son ejecutados en los dispositivos afectados, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS).\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de los archivos adjuntos de correo electr\u00f3nico.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje de correo electr\u00f3nico con un archivo adjunto dise\u00f1ado por medio de un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que procesos espec\u00edficos se bloqueen de manera repetida, resultando en la indisponibilidad total tanto de Cisco Advanced Malware Protection (AMP) como de las funcionalidades de seguimiento de mensajes y en una degradaci\u00f3n severa del rendimiento mientras se procesa el correo electr\u00f3nico.\u0026#xa0;Una vez que los procesos afectados se reinician, el software reanuda el filtrado del mismo archivo adjunto, lo que hace que los procesos afectados se bloqueen y se reinicien nuevamente.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito tambi\u00e9n podr\u00eda permitir al atacante causar una condici\u00f3n DoS repetida. Puede ser requerida una intervenci\u00f3n manual para recuperarse de esta situaci\u00f3n" } ], "id": "CVE-2019-1983", "lastModified": "2024-11-21T04:37:49.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:14.613", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/101932 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039828 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101932 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039828 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:10.1.1-234:*:*:*:*:*:*:*", "matchCriteriaId": "13CDDB37-3A0A-4F80-8356-32DDB95050A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:10.1.1-235:*:*:*:*:*:*:*", "matchCriteriaId": "FC59E598-B7FE-4C19-B840-7E40C75A8F89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943." }, { "lang": "es", "value": "Una vulnerabilidad en la caracter\u00edstica de filtrado de archivos Advanced Malware Protection (AMP) de Cisco AsyncOS Software para Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto sin autenticar omita una regla de filtrado de archivos AMP configurada. Los tipos de archivo que se han visto afectados son los comprimidos o zip. La vulnerabilidad se debe a los valores hash de archivo incorrectos y diferentes cuando AMP escanea el archivo. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un archivo adjunto de correo electr\u00f3nico manipulado al dispositivo objetivo. Un exploit podr\u00eda permitir que el atacante omita un filtro de archivos AMP configurado. Cisco Bug IDs: CSCvf52943." } ], "id": "CVE-2017-12303", "lastModified": "2024-11-21T03:09:16.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-16T07:29:00.430", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101932" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039828" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | content_security_management_appliance | - | |
cisco | email_security_appliance | - | |
cisco | web_security_appliance | - | |
cisco | asyncos | * | |
cisco | ironport_web_security_appliance | 13.6.2-023 | |
cisco | ironport_web_security_appliance | 14.0.0-090 | |
cisco | ironport_web_security_appliance | 14.0.0-133 | |
cisco | ironport_web_security_appliance | 14.0.0-292 | |
cisco | ironport_web_security_appliance | 14.0.0-300 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F22A698-F34C-44C0-9911-0840A2E7E163", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2555C-7E97-475F-9EDC-027B51A40708", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "71D9CB16-8225-4935-91A9-C0EA9A4305BD", "versionEndExcluding": "14.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:13.6.2-023:*:*:*:*:*:*:*", "matchCriteriaId": "9FC801CD-44BA-4026-9FA4-A40A9D821E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-090:*:*:*:*:*:*:*", "matchCriteriaId": "BD0CF884-1313-446F-BFDA-A690C5F6D495", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-133:*:*:*:*:*:*:*", "matchCriteriaId": "D06C6D3F-483C-4735-B488-1A11DC372B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-292:*:*:*:*:*:*:*", "matchCriteriaId": "A7FF3FE1-6DE5-4CD5-A864-1E136D059926", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ironport_web_security_appliance:14.0.0-300:*:*:*:*:*:*:*", "matchCriteriaId": "E601B03B-DF17-4F0B-A2DA-415FDC581931", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), y Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado acceder a informaci\u00f3n confidencial. en un dispositivo afectado.\u0026#xa0;La vulnerabilidad se presenta porque la informaci\u00f3n confidencial es inclu\u00edda en las peticiones HTTP que son intercambiadas entre el usuario y el dispositivo.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al observar las peticiones HTTP sin procesar que son enviadas a la interfaz.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as que est\u00e1n configuradas en toda la interfaz" } ], "id": "CVE-2021-1516", "lastModified": "2024-11-21T05:44:31.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-06T13:15:10.953", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-540" } ], "source": "ykramarz@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1ED121A-E76C-4256-A2BB-B44E9FC85B9B", "versionEndIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343." }, { "lang": "es", "value": "El motor de inspecci\u00f3n uuencode en Cisco AsyncOS en los dispositivos Cisco Email Security Appliance (ESA) 8.5 y anteriores permite a atacantes remotos evadir las restricciones de contenido a trav\u00e9s de un adjunto de email manipulado con cifrado uuencode, tambi\u00e9n conocido como Bug ID CSCzv54343." } ], "id": "CVE-2015-0605", "lastModified": "2024-11-21T02:23:23.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-07T04:59:09.000", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/62829" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/72528" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | secure_email_and_web_manager | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B09056C-2EA0-42EC-BB1E-5CC21004BBA9", "versionEndExcluding": "14.02.0-020", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C660070-35AF-4D48-A90D-E3BFFE161503", "versionEndExcluding": "14.1.0-239", "versionStartIncluding": "12.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBEE74B8-1D30-4A2C-B720-7E61CA134C89", "versionEndExcluding": "14.0.2-012", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la pila TCP/IP de Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA) y Cisco Secure Email and Web Manager, anteriormente Security Management Appliance, podr\u00eda permitir a un atacante remoto no autenticado bloquear el Servicio del Protocolo Simple de Administrador de Redes (SNMP), resultando en una situaci\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido a una escucha de puerto abierta en el puerto TCP 199. Un atacante podr\u00eda explotar esta vulnerabilidad al conectarse al puerto TCP 199. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante bloquear el servicio SNMP, resultando en una condici\u00f3n de DoS" } ], "id": "CVE-2022-20675", "lastModified": "2024-11-21T06:43:17.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.007", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-248" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9625B97C-0AAE-4663-96A0-15B3630F822B", "versionEndExcluding": "14.2.1-015", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA0D435-B4A2-4445-AF55-D698F459AF98", "versionEndExcluding": "14.3.0-023", "versionStartIncluding": "14.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "0609158E-0B18-44F9-8B9F-F52C516AA2E3", "versionEndExcluding": "14.2.0-217", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "863E9EA1-BDE7-448C-AE8E-7C76BEB67342", "versionEndExcluding": "14.3.0-115", "versionStartIncluding": "14.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "458945C0-C70B-4D25-BE9E-5293B9395125", "versionEndExcluding": "12.0.5-011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CB4F18A-3EE6-4765-B708-0A146973E75A", "versionEndExcluding": "12.5.4-005", "versionStartIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "15AC78C0-B461-45F3-BB08-EC93F91B31DC", "versionEndExcluding": "14.0.2-012", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "67074526-9933-46B3-9FE3-A0BE73C5E8A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.\r\n\r This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager y Cisco Secure Web Appliance, anteriormente conocido como Cisco Web Security Appliance (WSA), podr\u00eda permitir que un atacante remoto autenticado acceda a informaci\u00f3n sensible de un dispositivo afectado, incluidas las credenciales de usuario. Esta vulnerabilidad se debe a una aplicaci\u00f3n d\u00e9bil de las comprobaciones de autorizaci\u00f3n del back-end. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener datos confidenciales almacenados en el dispositivo afectado." } ], "id": "CVE-2022-20942", "lastModified": "2024-11-21T06:43:52.233", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:11.100", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-359" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/102729 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1040221 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1040222 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102729 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040221 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040222 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.1.1-005:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB6285-D227-48A4-8386-4AD82B0A1B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.7.2-065:*:*:*:*:*:*:*", "matchCriteriaId": "ACB9AC63-5F22-4CCD-9DDA-D024BF632F5C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726." }, { "lang": "es", "value": "Una vulnerabilidad en el shell administrativo de Cisco AsyncOS en Cisco Email Security Appliance (ESA) y Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante local autenticado escale su nivel de privilegios y obtenga acceso root. El atacante necesita tener credenciales de usuario v\u00e1lidas con al menos un nivel de privilegios de un usuario invitado. La vulnerabilidad se debe a una configuraci\u00f3n de red incorrecta en la interfaz de l\u00ednea de comandos shell administrativa. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo objetivo y enviando una serie de comandos manipulados maliciosamente a un shell administrativo. Un exploit podr\u00eda permitir que un atacante obtenga acceso root al dispositivo. Cisco Bug IDs: CSCvb34303, CSCvb35726." } ], "id": "CVE-2018-0095", "lastModified": "2024-11-21T03:37:30.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T06:29:00.753", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102729" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040221" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040222" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1ED121A-E76C-4256-A2BB-B44E9FC85B9B", "versionEndIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934." }, { "lang": "es", "value": "El motor de inspecci\u00f3n ZIP en Cisco AsyncOS 8.5 y anteriores en Cisco Email Security Appliance (ESA) no analiza correctamente los archivos ZIP, lo que permite a atacantes remotos evadir la filtraci\u00f3n de malware a trav\u00e9s de un archivo manipulado, tambi\u00e9n conocido como Bug ID CSCup07934." } ], "id": "CVE-2014-3381", "lastModified": "2024-11-21T02:07:58.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-19T01:55:13.607", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/103407 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1040464 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103407 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040464 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:10.5.1-296:*:*:*:*:*:*:*", "matchCriteriaId": "1FBE634F-F3AA-4DDD-A177-CA808777432C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281." }, { "lang": "es", "value": "Una vulnerabilidad en el servidor FTP de Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto no autenticado inicie sesi\u00f3n en el servidor FTP del dispositivo sin una contrase\u00f1a v\u00e1lida. El atacante necesita tener un nombre de usuario v\u00e1lido. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de las credenciales de usuario FTP. Un atacante podr\u00eda explotar esta vulnerabilidad utilizando FTP para conectarse a la direcci\u00f3n IP de administraci\u00f3n del dispositivo objetivo. Su explotaci\u00f3n podr\u00eda permitir que el atacante inicie sesi\u00f3n en el servidor FTP de Cisco WSA sin tener una contrase\u00f1a v\u00e1lida. La vulnerabilidad afecta a Cisco AsyncOS para software de WSA, tanto en m\u00e1quinas virtuales como f\u00edsicas que ejecuten cualquier distribuci\u00f3n de AsyncOS 10.5.1 para el software de WSA. El dispositivo es vulnerable solo si est\u00e1 FTP habilitado en la interfaz de administraci\u00f3n. FTP est\u00e1 deshabilitado por defecto. Cisco Bug IDs: CSCvf74281." } ], "id": "CVE-2018-0087", "lastModified": "2024-11-21T03:37:29.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-08T07:29:00.223", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103407" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040464" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A74DE82-C879-48E3-8E74-F03D18B8ECF4", "versionEndExcluding": "14.2.1", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACCC821-A995-43A9-9BA2-8A335A55FC99", "versionEndExcluding": "14.2.0", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AEA203-411D-40C8-AA2A-A0FB4D2789DB", "versionEndExcluding": "12.5.5", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE2447D4-9F35-4D76-BF77-F4E63DB57DA1", "versionEndExcluding": "14.0.4", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:14.5:*:*:*:*:*:*:*", "matchCriteriaId": "2FFF4B58-3DAF-47D7-8569-5D3D27F14D22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "67074526-9933-46B3-9FE3-A0BE73C5E8A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability. \r\n\r\nThis vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account.\r\n" }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance, Cisco Secure Email and Web Manager y Cisco Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado eleve los privilegios en un sistema afectado. El atacante necesita credenciales v\u00e1lidas para aprovechar esta vulnerabilidad. Esta vulnerabilidad se debe al uso de un valor codificado a mano para cifrar un token utilizado para ciertas llamadas API. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando una solicitud HTTP manipulada. Un exploit exitoso podr\u00eda permitir al atacante hacerse pasar por otro usuario v\u00e1lido y ejecutar comandos con los privilegios de esa cuenta de usuario." } ], "id": "CVE-2022-20868", "lastModified": "2024-11-21T06:43:43.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:10.983", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/102002 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039917 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102002 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039917 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666." }, { "lang": "es", "value": "Una vulnerabilidad en el esc\u00e1ner Multipurpose Internet Mail Extensions (MIME) de Cisco AsyncOS Software para Cisco Email Security Appliances (ESA) podr\u00eda permitir que un atacante remoto no autenticado omita los filtros de usuario configurados en el dispositivo. La vulnerabilidad se debe a la gesti\u00f3n incorrecta de errores de una cabecera MIME en un archivo adjunto de correo electr\u00f3nico. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un correo electr\u00f3nico con un archivo adjunto MIME manipulado. Por ejemplo, un exploit exitoso podr\u00eda permitir que el atacante omita los filtros de usuario configurados para enviar el correo electr\u00f3nico. Las cabeceras MIME podr\u00edan no ser compatibles con RFC. Sin embargo, algunos clientes de correo electr\u00f3nico podr\u00edan seguir permitiendo que los usuarios accedan al archivo adjunto, que tal vez no haya sido correctamente filtrado por el dispositivo. Cisco Bug IDs: CSCvf44666." } ], "id": "CVE-2017-12353", "lastModified": "2024-11-21T03:09:21.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-30T09:29:01.073", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102002" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039917" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory | |
ykramarz@cisco.com | http://www.securityfocus.com/bid/92155 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1036470 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92155 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036470 | Broken Link, Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A80953D2-88BB-40A5-A235-90777B3DC601", "versionEndIncluding": "9.7.0-125", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C2C6F-6D46-4BBE-A902-7AD031D8EBA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932." }, { "lang": "es", "value": "Cisco AsyncOS en dispositivos Email Security Appliance (ESA) hasta la versi\u00f3n 9.7.0-125 permite a atacantes remotos eludir la detecci\u00f3n de malware a trav\u00e9s de un adjunto manipulado en un mensaje de e-mail, tambi\u00e9n conocido como Bug ID CSCuz14932." } ], "id": "CVE-2016-1461", "lastModified": "2024-11-21T02:46:29.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-01T02:59:00.167", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92155" }, { "source": "ykramarz@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036470" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B4174B-CF51-4C89-A45D-98D2373F7A68", "versionEndExcluding": "13.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F7EB41-5A39-41A4-A652-1446DB2CFAE1", "versionEndExcluding": "13.5.4.102", "versionStartIncluding": "13.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E678E750-A5A0-4450-A856-A6A30F204A85", "versionEndExcluding": "14.0.2.020", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en el componente de verificaci\u00f3n de correo electr\u00f3nico DANE (DNS-based Authentication of Named Entities) del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a un manejo insuficiente de errores en la resoluci\u00f3n de nombres DNS por parte del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de mensajes de correo electr\u00f3nico con un formato especial que sean procesados por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar a el dispositivo volverse inalcanzable desde las interfaces de administraci\u00f3n o procesar mensajes de correo electr\u00f3nico adicionales durante un per\u00edodo de tiempo hasta que el dispositivo sea recuperado, resultando en una condici\u00f3n de DoS. Los ataques continuados podr\u00edan causar que el dispositivo quedara completamente inaccesible, resultando en una condici\u00f3n de DoS persistente" } ], "id": "CVE-2022-20653", "lastModified": "2024-11-21T06:43:14.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-17T15:15:09.377", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/106507 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106507 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B8FDFFB-2C0D-4D16-9EBB-E7D2C8146510", "versionEndExcluding": "11.0.2-044_md", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E00BFAD3-004E-4F6F-BA74-ACB6AD05970A", "versionEndExcluding": "11.1.2-023_md", "versionStartIncluding": "11.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de filtrado de mensajes de correo electr\u00f3nico de Cisco AsyncOS Software para Cisco Email Security Appliances (ESA) podr\u00eda permitir que un atacante remoto no autenticado aumente el uso de la CPU hasta el 100 por ciento, provocando una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe al filtrado incorrecto de mensajes de email que contienen referencias a URL en lista blanca. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un mensaje de correo electr\u00f3nico malicioso que contiene un gran n\u00famero de URL en lista blanca. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque una condici\u00f3n continuada de denegaci\u00f3n de servicio (DoS) que podr\u00eda forzar al dispositivo afectado a que pare de escanear y reenviar mensajes de correo electr\u00f3nico." } ], "id": "CVE-2018-15460", "lastModified": "2024-11-21T03:50:51.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-10T22:29:00.237", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106507" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F97C8DE-48FA-4609-BF07-8E6AD4C34322", "versionEndExcluding": "14.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL en un dispositivo afectado. Esta vulnerabilidad es debido al procesamiento inapropiado de las URL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una URL de una manera particular. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL que est\u00e1n configurados para un dispositivo afectado, lo que podr\u00eda permitir el paso de URLs maliciosas mediante el dispositivo" } ], "id": "CVE-2021-1534", "lastModified": "2024-11-21T05:44:34.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T20:15:07.657", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | secure_email_gateway | - | |
cisco | asyncos | * | |
cisco | secure_email_and_web_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A74DE82-C879-48E3-8E74-F03D18B8ECF4", "versionEndExcluding": "14.2.1", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFF3E86-0ED8-40CA-BD69-9FD67F32A31A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACCC821-A995-43A9-9BA2-8A335A55FC99", "versionEndExcluding": "14.2.0", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB4207E0-A5C1-4945-B996-722933148C37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account. \r\n\r This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.\r\n" }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Email Security Appliance y Cisco Secure Email and Web Manager podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n SQL como root en un sistema afectado. El atacante debe tener las credenciales de una cuenta de usuario con altos privilegios. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de los par\u00e1metros enviados por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en la aplicaci\u00f3n y enviando solicitudes maliciosas a un sistema afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener datos o modificar datos almacenados en la base de datos subyacente del sistema afectado." } ], "id": "CVE-2022-20867", "lastModified": "2024-11-21T06:43:43.000", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-04T18:15:10.923", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF6B0854-F5C9-445F-9816-193FDD9E37F7", "versionEndIncluding": "13.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to insufficient validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface of an affected device. A successful exploit could allow the attacker to obtain the IP addresses that are configured on the internal interfaces of the affected device. There is a workaround that addresses this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web en el software de Cisco AsyncOS para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado acceder a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de peticiones que son enviadas a la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n dise\u00f1ada a la interfaz de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener las direcciones IP que est\u00e1n configuradas en las interfaces internas del dispositivo afectado. Existe una soluci\u00f3n alternativa que soluciona esta vulnerabilidad" } ], "id": "CVE-2020-3546", "lastModified": "2024-11-21T05:31:17.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-04T03:15:11.120", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - | |
cisco | asyncos | * | |
cisco | content_security_management_appliance | - | |
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "94855F23-1DA0-4A08-BBE5-167A265A4155", "versionEndIncluding": "13.5.1-277", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9010DBBA-9AE9-4510-A63B-1C1843A98C23", "versionEndIncluding": "13.6.1-193", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "60635EC8-9AFA-400D-A919-66E60CDEF852", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD91D872-A21C-4A08-8A05-D0D9B0372570", "versionEndIncluding": "11.7.2-011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web en el software Cisco AsyncOS para Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA) y Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado acceder a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad se presenta porque un m\u00e9todo no seguro es usado para enmascarar determinadas contrase\u00f1as en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda explotar esta vulnerabilidad al observar el c\u00f3digo HTML sin procesar que es recibido desde la interfaz. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as configuradas en toda la interfaz" } ], "id": "CVE-2020-3547", "lastModified": "2024-11-21T05:31:17.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-04T03:15:11.200", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "173DC603-2082-4165-8F90-52599DE17D07", "versionEndIncluding": "13.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam del Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de las URL.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una URL de una manera en particular.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL que est\u00e1n configurados para el dispositivo afectado, lo que podr\u00eda permitir que unas URL maliciosas pasen a trav\u00e9s del dispositivo" } ], "id": "CVE-2020-3568", "lastModified": "2024-11-21T05:31:19.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-08T05:15:15.383", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | 9.7.0-125 | |
cisco | email_security_appliance_firmware | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.7.0-125:*:*:*:*:*:*:*", "matchCriteriaId": "B61836C4-3E3F-4D80-9919-ECBB9587F035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA3A518-E103-4D98-A040-88ED4E0D73CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210." }, { "lang": "es", "value": "Cisco AsyncOS 9.7.0-125 en dispositivos Email Security Appliance (ESA) permite a atacantes remotos eludir el filtrado de spam previsto a trav\u00e9s de contenido ejecutable manipulado en un archivo ZIP, tambi\u00e9n conocido como Bug ID CSCuy39210." } ], "id": "CVE-2016-1438", "lastModified": "2024-11-21T02:46:26.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-23T00:59:07.037", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1036156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036156" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "415C4EC7-44E1-4C07-85F0-665A186237EC", "versionEndExcluding": "13.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.5.3-010:*:*:*:*:*:*:*", "matchCriteriaId": "E2CCDF88-877D-4CB0-B7BD-24D317FA6F16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:13.7.0-093:*:*:*:*:*:*:*", "matchCriteriaId": "3E94354C-6D93-4136-A4B6-5F926E02CA12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:m170:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BD3B1B3-3AFD-4B4A-9FCC-F2EEFA497032", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56CF47B-72C9-4590-89B0-59D43CA65894", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m380:-:*:*:*:*:*:*:*", "matchCriteriaId": "81DBE5E7-524E-458C-BA56-AA806A55ACAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFD07C1-F2A7-4DCE-8269-C8B3D2DE1C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "9107B3CD-A607-4C11-ACAC-ACE66DDA51F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m680:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDB92-73A0-4FF1-976E-0CD9D342A712", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA39FE7-9CDA-41D3-B31D-33F9DB2FB0B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E68E58E5-00AB-41BB-85C0-6D65359A4DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797CD28-48A3-45BD-BF68-F0DF6F5A5579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D20279-8176-449A-AF4C-E2C90F370B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9408ADA-7A8F-4528-8236-65713CF642D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en el algoritmo de an\u00e1lisis del correo electr\u00f3nico del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado llevar a cabo un ataque de denegaci\u00f3n de servicio (DoS) contra un dispositivo afectado. Esta vulnerabilidad es debido a que la comprobaci\u00f3n de entrada de los correos electr\u00f3nicos entrantes es insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un correo electr\u00f3nico dise\u00f1ado mediante Cisco ESA. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante agotar todos los recursos de CPU disponibles en un dispositivo afectado durante un per\u00edodo prolongado de tiempo, impidiendo que otros correos electr\u00f3nicos sean procesados y dando lugar a una condici\u00f3n de DoS" } ], "id": "CVE-2021-34741", "lastModified": "2024-11-21T06:11:05.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-04T16:15:08.660", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "matchCriteriaId": "87AA6AB8-12B9-4810-9D06-01EEBF7B01C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en la p\u00e1gina IronPort Spam Quarantine (ISQ) en Cisco AsyncOS, utilizado en Cisco Email Security Appliance (ESA) y Content Security Management Appliance (SMA), permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de par\u00e1metro no especificados, tambi\u00e9n conocido como Bug IDs CSCus22925 y CSCup08113." } ], "id": "CVE-2015-0577", "lastModified": "2024-11-21T02:23:21.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-14T19:59:01.600", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/62289" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/72056" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031544" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/100920 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039414 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100920 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039414 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDBDE866-1A7E-4D06-9753-09CA2748E336", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "66B4BD6E-05A1-46F8-AD08-C57A15DAD389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECE65F11-D473-404B-AA99-68EFBC6855DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "8FC71421-BBED-4EEB-991A-650698F1862A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A838252C-3B2A-4D80-99AA-9C88D13D751C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.7:*:*:*:*:*:*:*", "matchCriteriaId": "38DA5A67-D93C-4AAF-A8CB-E3CB1ECAD7FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:9.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0E7EB49-7E83-44DB-8462-AE1241A239D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354." }, { "lang": "es", "value": "Una vulnerabilidad en la caracter\u00edstica de filtrado de mensajes de correo de Cisco AsyncOS Software para Cisco Email Security Appliance podr\u00eda permitir a un atacante autenticado remoto provocar que el dispositivo afectado agote su memoria y deje de escanear y reenviar mensajes de correo. Agotar la memoria del sistema puede provocar el cierre inesperado del proceso de filtrado, resultando en una denegaci\u00f3n de servicio (DoS) en el dispositivo. Esta vulnerabilidad afecta desde la versi\u00f3n de software 9.0 hasta la primera distribuci\u00f3n corregida de Cisco AsyncOS Software para Cisco Email Security Appliances, tanto para m\u00e1quinas virtuales como f\u00edsicas, si el software se configura para aplicar un filtro de mensaje o de contenido a los archivos adjuntos de email entrantes. Esta vulnerabilidad no se limita a reglas o acciones espec\u00edficas para un filtro de mensaje o de contenido. Cisco Bug IDs: CSCvd29354." } ], "id": "CVE-2017-12215", "lastModified": "2024-11-21T03:09:03.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-21T05:29:00.277", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100920" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039414" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | web_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7693CE1B-D30F-4491-988F-8D420606CCEE", "versionEndExcluding": "14.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco AsyncOS para Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto autenticado conducir un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz de un dispositivo afectado. La vulnerabilidad es debido a que la interfaz de administraci\u00f3n basada en web no comprueba correctamente las entradas proporcionadas por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad insertando datos maliciosos en un campo de datos espec\u00edfico de la interfaz afectada. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada" } ], "id": "CVE-2022-20781", "lastModified": "2024-11-21T06:43:32.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.430", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA8D0F-6BF0-4E06-8055-8720ED3ADD16", "versionEndExcluding": "11.7.2-011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2483ED5-35F5-4E2F-B308-2293D9F115E2", "versionEndExcluding": "11.8.2-009", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB33545E-F920-4B6D-838F-9C6DAD0323C5", "versionEndExcluding": "12.0.2", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "362A3154-5E4E-453A-BA69-4967B15FFB81", "versionEndExcluding": "12.5.1-011", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." }, { "lang": "es", "value": "Una vulnerabilidad en el subsistema de suscripci\u00f3n de registros de Cisco AsyncOS para Cisco Secure Web Appliance (anteriormente Web Security Appliance), podr\u00eda permitir a un atacante local autenticado llevar a cabo la inyecci\u00f3n de comandos y elevar los privilegios a root.\u0026#xa0;Esta vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por el usuario hacia la interfaz web y CLI.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en el dispositivo afectado e inyectar comandos de scripting en el \u00e1mbito del subsistema de suscripci\u00f3n de registros.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root" } ], "id": "CVE-2020-3367", "lastModified": "2024-11-21T05:30:53.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-18T18:15:12.480", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/109049 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109049 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 10.5.3-025 | |
cisco | web_security_appliance | 11.7.0-fcs-334 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9081B2CB-90C8-428D-91DF-B30DC68AB5BF", "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72CE539-D7A7-41D9-9B0E-727435449E80", "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.3-025:*:*:*:*:*:*:*", "matchCriteriaId": "9B73A407-DD94-455A-BCC2-96A77F9CCA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-334:*:*:*:*:*:*:*", "matchCriteriaId": "F7EE04AC-5EFE-46D2-8B54-E923E90E4601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n de descifrado HTTPS de Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se debe a la validaci\u00f3n insuficiente de los certificados de servidor Secure Sockets Layer (SSL). Un atacante podr\u00eda aprovechar esta vulnerabilidad instalando un certificado con formato incorrecto en un servidor web y envi\u00e1ndole una solicitud a trav\u00e9s de Cisco WSA. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante provocar un reinicio inesperado del proceso de proxy en un dispositivo afectado." } ], "id": "CVE-2019-1886", "lastModified": "2024-11-21T04:37:36.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-04T20:15:11.000", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109049" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
cisco | web_security_appliance | 11.8.0-429 | |
cisco | web_security_appliance | 11.8.0-453 | |
cisco | asyncos | * | |
cisco | asyncos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-429:*:*:*:*:*:*:*", "matchCriteriaId": "06E21E49-87C9-4A3A-B863-2B62840A6EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.8.0-453:*:*:*:*:*:*:*", "matchCriteriaId": "8139895F-D814-49BB-BD21-B06046BC8A27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE100155-337B-4C98-8F1D-2BD09321ED74", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "392D682A-BF21-4BE0-B64E-99D64D43DD67", "versionEndExcluding": "12.5.2", "versionStartIncluding": "12.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la administraci\u00f3n de la configuraci\u00f3n de Cisco AsyncOS para Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado llevar a cabo una inyecci\u00f3n de comandos y elevar los privilegios a root. Esta vulnerabilidad se presenta debido a que la comprobaci\u00f3n de la entrada XML suministrada por el usuario para la interfaz web es insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad al cargar archivos de configuraci\u00f3n XML dise\u00f1ados que contengan c\u00f3digo de scripting en un dispositivo vulnerable. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente y elevar los privilegios a root. Un atacante necesitar\u00eda una cuenta de usuario v\u00e1lida con los derechos para cargar archivos de configuraci\u00f3n para explotar esta vulnerabilidad" } ], "id": "CVE-2021-1359", "lastModified": "2024-11-21T05:44:10.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-08T19:15:08.287", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-112" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "706A904F-2F7D-41E2-AA14-4A6F2E089507", "versionEndExcluding": "12.0.3-005", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D31D5B5B-F0AC-4F6F-82CC-59F2256C94EB", "versionEndExcluding": "12.5.2-007", "versionStartIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF9EB09B-AF00-487B-9AB3-5ECB2E700260", "versionEndExcluding": "14.0.1-014", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*", "matchCriteriaId": "E401F29A-026F-4097-B513-47911CB3AA09", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3B097B-F689-4886-A0C6-B71ECAD783CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C3AECC-9270-42B5-A36E-208AA0B48D93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*", "matchCriteriaId": "5290B9CF-CF7D-4762-B5EE-5DAEA03C6409", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE85462C-079B-4488-AB0E-989D41EB7AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A8E5E8-8361-4BC8-BFA9-CAE4745A9C48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBEAFE16-BD4F-4538-9A06-173FB678DB8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." }, { "lang": "es", "value": "Una vulnerabilidad en el servicio proxy de Cisco AsyncOS para Cisco Web Security Appliance (WSA) podr\u00eda permitir a un atacante remoto no autenticado agotar la memoria del sistema y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a una administraci\u00f3n inapropiada de la memoria en el servicio proxy de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al establecer un gran n\u00famero de conexiones HTTPS al dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el sistema deje de procesar nuevas conexiones, lo que podr\u00eda resultar en una condici\u00f3n de DoS. Nota: Puede ser necesaria una intervenci\u00f3n manual para recuperarse de esta situaci\u00f3n" } ], "id": "CVE-2021-34698", "lastModified": "2024-11-21T06:10:58.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T20:15:08.490", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.1.4-017 | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 11.5.1-fcs-125 | |
cisco | web_security_appliance | 11.7.0-256 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B833081-5EA8-42BB-9CD0-D278AFE3FFDA", "versionEndExcluding": "10.5.5-005", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72CE539-D7A7-41D9-9B0E-727435449E80", "versionEndExcluding": "11.5.2-020", "versionStartIncluding": "11.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD71C35-D0E3-403C-BE0D-63A8E3277BEA", "versionEndExcluding": "11.7.0-407", "versionStartIncluding": "11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.1.4-017:*:*:*:*:*:*:*", "matchCriteriaId": "4C1C1F79-CEFE-4361-8D0C-584BD865DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "matchCriteriaId": "4608EA78-F5CD-42A3-9F25-124ED4A7F792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-256:*:*:*:*:*:*:*", "matchCriteriaId": "FA16DA3E-FD12-475B-997F-C5FDBC13AADA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de proxy web de Cisco AsyncOS Software para Cisco Web Security Appliance (WSA) podr\u00eda permitir que un atacante remoto autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a mecanismos de validaci\u00f3n de entrada insuficientes para ciertos campos en las solicitudes HTTP/HTTPS enviadas a trav\u00e9s de un dispositivo afectado. Un atacante con \u00e9xito podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP/HTTPS malintencionada a trav\u00e9s de un dispositivo afectado. Una vulnerabilidad podr\u00eda permitir que el atacante obligue al dispositivo a detener el procesamiento del tr\u00e1fico, lo que resulta en una condici\u00f3n DoS." } ], "id": "CVE-2019-1884", "lastModified": "2024-11-21T04:37:36.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-04T20:15:10.937", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | asyncos | * | |
cisco | web_security_appliance | 10.5.2-072 | |
cisco | web_security_appliance | 11.5.1-fcs-125 | |
cisco | web_security_appliance | 11.7.0-fcs-418 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "79ADCDD2-51B2-444C-9D78-8EEC31D460BD", "versionEndExcluding": "10.1.5-004", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CA643A1-3290-48E9-A447-65C522D5C8A8", "versionEndExcluding": "11.5.3-016", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0FD156D-EB17-4594-89F2-57DE438B3F91", "versionEndExcluding": "11.7.1-006", "versionStartIncluding": "11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:10.5.2-072:*:*:*:*:*:*:*", "matchCriteriaId": "B8F218D6-2AF8-449B-8016-E0B8AAA362D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.5.1-fcs-125:*:*:*:*:*:*:*", "matchCriteriaId": "4608EA78-F5CD-42A3-9F25-124ED4A7F792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.7.0-fcs-418:*:*:*:*:*:*:*", "matchCriteriaId": "67723D99-6D51-452C-9512-3474721EF5F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web del Software Cisco AsyncOS para Cisco Web Security Appliance (WSA), podr\u00eda permitir a un atacante remoto autenticado realizar un reinicio no autorizado del sistema en un dispositivo afectado. La vulnerabilidad es debido a controles de autorizaci\u00f3n inapropiados para una URL espec\u00edfica en la interfaz de administraci\u00f3n web. Un atacante podr\u00eda explotar esta vulnerabilidad al enviar una petici\u00f3n HTTP dise\u00f1ada en un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda tener un doble impacto: el atacante podr\u00eda cambiar la contrase\u00f1a del administrador, conseguir acceso privilegiado o restablecer los detalles de configuraci\u00f3n de red, causando una condici\u00f3n de denegaci\u00f3n de servicio (DoS). En ambos escenarios, una intervenci\u00f3n manual es requerida para restaurar las operaciones normales." } ], "id": "CVE-2019-15956", "lastModified": "2024-11-21T04:29:49.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-26T03:15:11.440", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | asyncos | * | |
cisco | email_security_appliance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3202803F-9125-40A6-B07D-7EAB3CD2279C", "versionEndExcluding": "13.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD0BAE-272E-4B9F-8F3B-B6091DEA5E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam de Cisco AsyncOS Software para Cisco Email Security Appliance (ESA), podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de las URL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar la URL de una manera particular. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL configurados para el dispositivo afectado, lo que podr\u00eda permitir que las URL maliciosas pasen por medio del dispositivo" } ], "id": "CVE-2020-3368", "lastModified": "2024-11-21T05:30:53.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:14.793", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }