SB2018090716 - Security restrictions bypass in Cisco Email Security Appliance



SB2018090716 - Security restrictions bypass in Cisco Email Security Appliance

Published: September 7, 2018

Security Bulletin ID SB2018090716
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper input validation (CVE-ID: CVE-2018-0447)

The vulnerability allows a remote unauthenticated attacker to bypass security restrictions on the target system.

The vulnerability exists in the anti-spam protection mechanisms of Cisco AsyncOS Software for the Cisco Email Security Appliance (ESA) due to incomplete input and validation checking mechanisms for certain Sender Policy Framework (SPF) messages that are sent to an affected device. A remote attacker can send a customized SPF packet, bypass the URL filters that are configured and pass through the device.


Remediation

Install update from vendor's website.