SB2020061816 - Security Bypass in Cisco AsyncOS Software for Cisco Email Security Appliance



SB2020061816 - Security Bypass in Cisco AsyncOS Software for Cisco Email Security Appliance

Published: June 18, 2020

Security Bulletin ID SB2020061816
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2020-3368)

The vulnerability allows a remote attacker to bypass the URL reputation filters on an affected device.

The vulnerability exists due to insufficient validation of user-supplied input in the antispam protection mechanisms. A remote attacker can craft the URL in a particular way and bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.


Remediation

Install update from vendor's website.