Multiple vulnerabilities in Cisco Email Security Appliance and Cisco Secure Email and Web Manager



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-20009
CVE-2023-20075
CWE-ID CWE-20
CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software
Cisco Email Security Appliance
Server applications / IDS/IPS systems, Firewalls and proxy servers

Cisco Secure Email and Web Manager
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU72309

Risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-20009

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of an uploaded Simple Network Management Protocol (SNMP) configuration file. A remote attacker can upload a specially crafted SNMP configuration file and execute arbitrary code as root.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Email Security Appliance: before 12.5.4-041

Cisco Secure Email and Web Manager: before 12.8.1-021

CPE2.3 External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd29901
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd29905


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) OS Command Injection

EUVDB-ID: #VU72310

Risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-20075

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation in the CLI. A local user with Operator-level privileges or higher can inject operating system commands into a legitimate command, escape the restricted command prompt and execute arbitrary commands on the underlying operating system as the CLI process user.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Email Security Appliance: before 12.5.4-041

CPE2.3 External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50043


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###