A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.
This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Asyncos
Subscribe
Email Security Appliance C160
Subscribe
Email Security Appliance C170
Subscribe
Email Security Appliance C190
Subscribe
Email Security Appliance C370
Subscribe
Email Security Appliance C370d
Subscribe
Email Security Appliance C380
Subscribe
Email Security Appliance C390
Subscribe
Email Security Appliance C670
Subscribe
Email Security Appliance C680
Subscribe
Email Security Appliance C690
Subscribe
Email Security Appliance C690x
Subscribe
Email Security Appliance X1070
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24236 | A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-02T08:57:35.557Z
Reserved: 2022-10-27T18:47:50.320Z
Link: CVE-2023-20057
No data.
Status : Modified
Published: 2023-01-20T07:15:17.377
Modified: 2024-11-21T07:40:27.190
Link: CVE-2023-20057
No data.
OpenCVE Enrichment
No data.
EUVD