Vulnerability of Cisco AsyncOS: filtering bypass via MIME typing Synthesis of the vulnerability An attacker can tamper with MIME headers in SMTP and HTTP connections filtered by Cisco AsyncOS, in order to bypass the content filtering.Severity of this alert: 2/4. Creation date: 16/02/2017. Références of this alert: CERTFR-2017-AVI-052, cisco-sa-20170215-asyncos, CVE-2017-3827, VIGILANCE-VUL-21863. Description of the vulnerability The Cisco AsyncOS product is used to filter exchanged data in mail and web. However, some syntax errors in the MIME headers disable the processing of the current file. An attacker can therefore tamper with MIME headers in SMTP and HTTP connections filtered by Cisco AsyncOS, in order to bypass the content filtering.Full Vigil@nce bulletin... (Request your free trial)This cybersecurity announce impacts software or systems such as AsyncOS, Cisco ESA. Our Vigil@nce team determined that the severity of this threat alert is medium. The trust level is of type confirmed by the editor, with an origin of document. An attacker with a expert ability can exploit this computer weakness alert. Solutions for this threat Cisco AsyncOS: solution CSCvb91473, CSCvc76500. The solution is described on the Cisco site: https://tools.cisco.com/bugsearch/bug/CSCvb91473 https://tools.cisco.com/quickview/bug/CSCvb91473 https://tools.cisco.com/bugsearch/bug/CSCvc76500 https://tools.cisco.com/quickview/bug/CSCvc76500 Full Vigil@nce bulletin... (Request your free trial) Computer vulnerabilities tracking service Vigil@nce provides computers vulnerabilities patches. The technology watch team tracks security threats targeting the computer system.