Vulnslist

find the latest Cisco vulnerabilities

Cisco Email Security Appliance MIME Header Processing Filter Bypass Vulnerability

cisco-sa-20161116-esa2 · Medium · Published · Updated

A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. The vulnerability is due to improper error handling when malformed Multipurpose Internet Mail Extensions (MIME) headers are present in an email attachment that is sent through an affected device. An attacker could exploit this vulnerability by sending an email message that has a crafted, MIME-encoded file attachment through an affected device. A successful exploit could allow the attacker to bypass AMP filter configurations for the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-esa2

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-6463
Cisco Bug IDsCSCuz85823
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco Email Security Appliance (ESA), Cisco Secure Email

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2016-6463 Cisco OpenVuln
Cisco Secure Email CVE-2016-6463 Cisco OpenVuln
Cisco Email Security Appliance (ESA) CVE-2016-6463 Cisco OpenVuln