Guest

Preview Tool

Cisco Bug: CSCvs52719 - Cisco Email Security Appliance Information Disclosure Vulnerability

Last Modified

Sep 25, 2020

Products (1)

  • Cisco Email Security Appliance

Known Affected Releases

13.0.0-314 13.0.0-375

Description (partial)

Symptom:
A vulnerability in the authorization module of Cisco Content Security Management Appliance (SMA) Software and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to gain out-of-scope access to email.

The vulnerability exists because the affected software does not correctly implement role permission controls. An attacker could exploit this vulnerability by using a custom role with specific permissions. A successful exploit could allow the attacker to access the spam quarantine of other users.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-sma-info-dis

Conditions:
At the time of publication, this vulnerability affected Cisco ESAs that were running Cisco ESA Software releases earlier than Release 13.0.1-030 and 13.5.1-269 and had the Local Spam Quarantine feature enabled.
At the time of publication, Cisco ESA Software releases 13.0.1-030, 13.5.1-269 and later contained the fix for this vulnerability.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.