The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Cisco AsyncOS: filtering bypass via MIME typing

Synthesis of the vulnerability 

An attacker can tamper with MIME headers in SMTP and HTTP connections filtered by Cisco AsyncOS, in order to bypass the content filtering.
Impacted systems: AsyncOS, Cisco ESA.
Severity of this alert: 2/4.
Creation date: 16/02/2017.
Références of this alert: CERTFR-2017-AVI-052, cisco-sa-20170215-asyncos, CVE-2017-3827, VIGILANCE-VUL-21863.

Description of the vulnerability 

The Cisco AsyncOS product is used to filter exchanged data in mail and web.

However, some syntax errors in the MIME headers disable the processing of the current file.

An attacker can therefore tamper with MIME headers in SMTP and HTTP connections filtered by Cisco AsyncOS, in order to bypass the content filtering.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity announce impacts software or systems such as AsyncOS, Cisco ESA.

Our Vigil@nce team determined that the severity of this threat alert is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer weakness alert.

Solutions for this threat 

Cisco AsyncOS: solution CSCvb91473, CSCvc76500.
The solution is described on the Cisco site:
  https://tools.cisco.com/bugsearch/bug/CSCvb91473
  https://tools.cisco.com/quickview/bug/CSCvb91473
  https://tools.cisco.com/bugsearch/bug/CSCvc76500
  https://tools.cisco.com/quickview/bug/CSCvc76500
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computers vulnerabilities patches. The technology watch team tracks security threats targeting the computer system.