Vulnslist

find the latest Cisco vulnerabilities

Cisco Email Security Appliance RAR File Attachment Scanner Bypass Vulnerability

cisco-sa-20161102-esa · Medium · Published · Updated

A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. The vulnerability is due to incorrect validation of protected or encrypted email attachments that are Roshal Archive (RAR) format files. An attacker could exploit this vulnerability by sending an email message that has a crafted RAR file attachment through an affected device. A successful exploit could allow the attacker to bypass content filters that are configured to detect and act upon protected or encrypted email attachments. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-esa

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-6458
Cisco Bug IDsCSCva52546
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:U/RC:C
Product Names From Source
Cisco Email Security Appliance (ESA), Cisco Secure Email

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2016-6458 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2016-6458 Cisco OpenVuln
Cisco Application Centric Infrastructure Virtual Edge CVE-2016-6458 Cisco OpenVuln
Cisco Secure Email CVE-2016-6458 Cisco OpenVuln
Cisco Email Security Appliance (ESA) CVE-2016-6458 Cisco OpenVuln