Количество 3
Количество 3
CVE-2021-1566
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.
GHSA-9pg8-7479-p4jw
A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests.
BDU:2021-03961
Уязвимость средства защиты от вредоносного программного обеспечения Cisco AMP для оконечных устройств программного обеспечения Cisco AsyncOS для систем обеспечения безопасности электронной почты Cisco Email Security Appliance (ESA) и интернет-шлюза Cisco Web Security Appliance, связанная с отсутствием отслеживания цепочки доверия при проверке сертификата, позволяющая нарушителю перехватить трафик между затронутыми устройствами
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-1566 A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests. | CVSS3: 7.4 | 0% Низкий | больше 4 лет назад | |
GHSA-9pg8-7479-p4jw A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests. | 0% Низкий | больше 3 лет назад | ||
BDU:2021-03961 Уязвимость средства защиты от вредоносного программного обеспечения Cisco AMP для оконечных устройств программного обеспечения Cisco AsyncOS для систем обеспечения безопасности электронной почты Cisco Email Security Appliance (ESA) и интернет-шлюза Cisco Web Security Appliance, связанная с отсутствием отслеживания цепочки доверия при проверке сертификата, позволяющая нарушителю перехватить трафик между затронутыми устройствами | CVSS3: 7.4 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу