Описание
The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338.
Ссылки
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.1.0-032:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.5.0-201:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.6.0-051:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-125:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-782:*:*:*:*:*:*:*
EPSS
Процентиль: 58%
0.00358
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-284
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338.
EPSS
Процентиль: 58%
0.00358
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-284