URL Filtering Bypass in Cisco Email Security Appliance Software
CVE-2023-20057
5.3MEDIUM
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 20 January 2023
Summary
A vulnerability exists in the URL filtering mechanism of the Cisco AsyncOS Software for the Email Security Appliance, allowing unauthenticated remote attackers to bypass security measures. This issue arises from improper processing of URLs, enabling an attacker to craft a malicious URL that evades URL reputation filters. If successful, the exploit permits harmful URLs to infiltrate the device’s security barriers, potentially leading to significant breaches in security protocols.
Affected Version(s)
Cisco Email Security Appliance (ESA) 10.0.1-087
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved