Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q66v-34fh-vw9m

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.

EPSS

Процентиль: 59%
0.00384
Низкий

8.6 High

CVSS3

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 8.6
nvd
около 7 лет назад

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.

CVSS3: 8.6
fstec
около 7 лет назад

Уязвимость функции фильтрации сообщений операционной системы Cisco AsyncOS, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 59%
0.00384
Низкий

8.6 High

CVSS3

Дефекты

CWE-770