The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Cisco Email Security Appliance

computer vulnerability bulletin CVE-2019-1933

Cisco Email Security Appliance: privilege escalation via Script Filter Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via Script Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data flow.
Provenance: document.
Creation date: 04/07/2019.
Identifiers: CERTFR-2019-AVI-304, cisco-sa-20190703-esa-filterpass, CSCvo55451, CVE-2019-1933, VIGILANCE-VUL-29688.

Description of the vulnerability

An attacker can bypass restrictions via Script Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-1921

Cisco Email Security Appliance: privilege escalation via Content Filter Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data flow.
Provenance: document.
Creation date: 04/07/2019.
Identifiers: CERTFR-2019-AVI-304, cisco-sa-20190703-esa-bypass, CSCvp88949, CVE-2019-1921, VIGILANCE-VUL-29687.

Description of the vulnerability

An attacker can bypass restrictions via Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-1905

Cisco Email Security Appliance: privilege escalation via GZIP Content Filter Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via GZIP Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data reading, data flow.
Provenance: document.
Creation date: 20/06/2019.
Identifiers: CERTFR-2019-AVI-284, cisco-sa-20190619-esa-bypass, CSCvo82840, CVE-2019-1905, VIGILANCE-VUL-29570.

Description of the vulnerability

An attacker can bypass restrictions via GZIP Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-1844

Cisco Email Security Appliance: privilege escalation via Filter Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: document.
Creation date: 02/05/2019.
Identifiers: cisco-sa-20190501-esa-bypass, CSCvm36810, CVE-2019-1844, VIGILANCE-VUL-29187.

Description of the vulnerability

An attacker can bypass restrictions via Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-1831

Cisco Email Security Appliance: privilege escalation via Content Filter Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data flow.
Provenance: document.
Creation date: 18/04/2019.
Identifiers: cisco-sa-20190417-esa-filter-bypass, CSCvo01349, CSCvo78686, CVE-2019-1831, VIGILANCE-VUL-29082.

Description of the vulnerability

An attacker can bypass restrictions via Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-0447

Cisco Email Security Appliance: privilege escalation via URL Filtering Bypass

Synthesis of the vulnerability

An attacker can bypass restrictions via URL Filtering Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: document.
Creation date: 06/09/2018.
Identifiers: CERTFR-2018-AVI-423, cisco-sa-20180905-esa-url-bypass, CSCvj55728, CSCvm26692, CVE-2018-0447, VIGILANCE-VUL-27158.

Description of the vulnerability

An attacker can bypass restrictions via URL Filtering Bypass of Cisco Email Security Appliance, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-0419

Cisco Email Security Appliance: code execution via Unfiltered EXE

Synthesis of the vulnerability

An attacker can use a vulnerability via Unfiltered EXE of Cisco Email Security Appliance, in order to run code.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: user access/rights, data flow.
Provenance: document.
Creation date: 16/08/2018.
Identifiers: CERTFR-2018-AVI-393, cisco-sa-20180815-esa-file-bypass, CSCvh03786, CVE-2018-0419, VIGILANCE-VUL-26993.

Description of the vulnerability

An attacker can use a vulnerability via Unfiltered EXE of Cisco Email Security Appliance, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-6922

FreeBSD: denial of service via SegmentSmack

Synthesis of the vulnerability

An attacker can generate a fatal error via TCP Reassembly of FreeBSD, in order to trigger a denial of service.
Impacted products: GAiA, SecurePlatform, CheckPoint Security Gateway, AsyncOS, Cisco Content SMA, Cisco ESA, Cisco WSA, FreeBSD, AIX, Junos OS, SRX-Series, Oracle Communications, pfSense.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 07/08/2018.
Identifiers: 6387, cisco-sa-20180824-linux-tcp, cpujan2019, CVE-2018-6922, FreeBSD-SA-18:08.tcp, ibm10737709, JSA10876, SegmentSmack, sk134253, VIGILANCE-VUL-26922.

Description of the vulnerability

An attacker can generate a fatal error via TCP Reassembly of FreeBSD, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-5390

Linux kernel: denial of service via SegmentSmack

Synthesis of the vulnerability

An attacker can generate a fatal error via tcp_prune_ofo_queue() of the Linux kernel, in order to trigger a denial of service.
Impacted products: GAiA, SecurePlatform, CheckPoint Security Gateway, AsyncOS, Cisco Content SMA, Cisco ESA, Cisco WSA, Debian, BIG-IP Hardware, TMOS, QRadar SIEM, Junos OS, Junos Space, SRX-Series, Linux, McAfee Email Gateway, McAfee NSM, McAfee NSP, McAfee Web Gateway, openSUSE Leap, Oracle Communications, RHEL, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, Ubuntu.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 07/08/2018.
Identifiers: CERTFR-2018-AVI-374, CERTFR-2018-AVI-375, CERTFR-2018-AVI-386, CERTFR-2018-AVI-390, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-420, CERTFR-2018-AVI-428, CERTFR-2018-AVI-457, CERTFR-2018-AVI-584, CERTFR-2019-AVI-346, CERTFR-2019-AVI-354, cisco-sa-20180824-linux-tcp, cpujan2019, CVE-2018-5390, DLA-1466-1, DSA-4266-1, ibm10742755, JSA10876, JSA10917, K95343321, openSUSE-SU-2018:2242-1, openSUSE-SU-2018:2404-1, RHSA-2018:2384-01, RHSA-2018:2395-01, RHSA-2018:2645-01, RHSA-2018:2776-01, RHSA-2018:2785-01, RHSA-2018:2789-01, RHSA-2018:2790-01, RHSA-2018:2791-01, RHSA-2018:2924-01, RHSA-2018:2933-01, RHSA-2018:2948-01, SB10249, SegmentSmack, sk134253, SUSE-SU-2018:2223-1, SUSE-SU-2018:2328-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2596-1, SUSE-SU-2019:14127-1, SUSE-SU-2019:1870-1, SYMSA1467, USN-3732-1, USN-3732-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3763-1, VIGILANCE-VUL-26913, VU#962459.

Description of the vulnerability

An attacker can generate a fatal error via tcp_prune_ofo_queue() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-0140

Cisco Email Security Appliance, Content Security Management Appliance: mail disclosure

Synthesis of the vulnerability

An attacker can tamper with the spam manager of Cisco Email Security Appliance and Content Security Management Appliance, in order to get any any mail.
Impacted products: AsyncOS, Cisco Content SMA, Cisco ESA.
Severity: 2/4.
Consequences: data reading.
Provenance: user account.
Creation date: 08/02/2018.
Identifiers: cisco-sa-20180207-esacsm, CVE-2018-0140, VIGILANCE-VUL-25252.

Description of the vulnerability

An attacker can tamper with the spam manager of Cisco Email Security Appliance and Content Security Management Appliance, in order to get any any mail.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco Email Security Appliance: