URL Filtering Bypass in Cisco Email Security Appliance Software
CVE-2023-20057

5.3MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
20 January 2023

Summary

A vulnerability exists in the URL filtering mechanism of the Cisco AsyncOS Software for the Email Security Appliance, allowing unauthenticated remote attackers to bypass security measures. This issue arises from improper processing of URLs, enabling an attacker to craft a malicious URL that evades URL reputation filters. If successful, the exploit permits harmful URLs to infiltrate the device’s security barriers, potentially leading to significant breaches in security protocols.

Affected Version(s)

Cisco Email Security Appliance (ESA) 10.0.1-087

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.