SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Email Security Appliance Vendors:   Cisco
Cisco Email Security Appliance Executable File Detection Bug Lets Remote Users Bypass Security Filtering on the Target System
SecurityTracker Alert ID:  1041531
SecurityTracker URL:  http://securitytracker.com/id/1041531
CVE Reference:   CVE-2018-0419   (Links to External Site)
Date:  Aug 21 2018
Impact:   Host/resource access via network
Vendor Confirmed:  Yes  
Version(s): 10.0.0-203, 11.0.0-264
Description:   A vulnerability was reported in Cisco Email Security Appliance (ESA). A remote user can bypass security filtering on the target system.

The system does not properly detect content within executable (EXE) files. A remote user can send a specially crafted EXE file to bypass security detection and filtering on the target system.

The vendor has assigned bug ID CSCvh03786 to this vulnerability.

Liam Romanis of InteliSecure EMEA reported this vulnerability.

Impact:   A remote user can bypass security filtering on the target system.
Solution:   No solution was available at the time of this entry.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-esa-file-bypass

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-esa-file-bypass (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-esa-file-bypass

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC