Cisco Bug: CSCvs52719 - Cisco Email Security Appliance Information Disclosure Vulnerability
Sep 25, 2020
- Cisco Email Security Appliance
Known Affected Releases
Symptom: A vulnerability in the authorization module of Cisco Content Security Management Appliance (SMA) Software and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to gain out-of-scope access to email. The vulnerability exists because the affected software does not correctly implement role permission controls. An attacker could exploit this vulnerability by using a custom role with specific permissions. A successful exploit could allow the attacker to access the spam quarantine of other users. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-sma-info-dis Conditions: At the time of publication, this vulnerability affected Cisco ESAs that were running Cisco ESA Software releases earlier than Release 13.0.1-030 and 13.5.1-269 and had the Local Spam Quarantine feature enabled. At the time of publication, Cisco ESA Software releases 13.0.1-030, 13.5.1-269 and later contained the fix for this vulnerability.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases