Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hw6v-rjm4-5m34

Опубликовано: 07 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.

A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.

EPSS

Процентиль: 79%
0.01273
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
почти 4 года назад

A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.

CVSS3: 5.3
fstec
больше 4 лет назад

Уязвимость реализации стека протоколов TCP/IP системы обеспечения безопасности электронной почты Cisco Email Security Appliance, интернет-шлюзов Cisco Web Security Appliance и устройства управления защитой контента Cisco Secure Email and Web Manager (ранее Cisco Security Management Appliance), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 79%
0.01273
Низкий

5.3 Medium

CVSS3