Vulnslist

find the latest Cisco vulnerabilities

Cisco Email Security Appliance Attachment Filter Bypass Vulnerability

cisco-sa-20170607-esa1 · Medium · Published · Updated

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of an email with an attachment and modified Multipurpose Internet Mail Extensions (MIME) header. An attacker could exploit this vulnerability by sending a malformed email message with an attachment. A successful exploit could allow the attacker to bypass configured message filters to drop the email. The email may not be RFC compliant. However, some mail clients could still allow users to read the email, which may not have been properly filtered by the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esa1

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2017-6671
Cisco Bug IDsCSCvd34632
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Email Security Appliance (ESA), Cisco Secure Email

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2017-6671 Cisco OpenVuln
Cisco Application Centric Infrastructure Virtual Edge CVE-2017-6671 Cisco OpenVuln
Cisco Secure Email CVE-2017-6671 Cisco OpenVuln
Cisco Email Security Appliance (ESA) CVE-2017-6671 Cisco OpenVuln