Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-20401
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email |
Version: N/A |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:secure_email:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "secure_email", "vendor": "cisco", "versions": [ { "lessThan": "15.5.1-055", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20401", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T03:55:39.066Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-esa-afw-bGG2UsjH", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Secure Email", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-36", "description": "Absolute Path Traversal", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-17T16:26:38.305Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-afw-bGG2UsjH", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" } ], "source": { "advisory": "cisco-sa-esa-afw-bGG2UsjH", "defects": [ "CSCwj53998" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20401", "datePublished": "2024-07-17T16:26:38.305Z", "dateReserved": "2023-11-08T15:08:07.660Z", "dateUpdated": "2024-08-01T21:59:42.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20401\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-07-17T17:15:13.540\",\"lastModified\":\"2024-11-21T08:52:33.533\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\\r\\n\\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\\r\\n\\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en las funciones de escaneo de contenido y filtrado de mensajes de Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado sobrescriba archivos arbitrarios en el sistema operativo subyacente. Esta vulnerabilidad se debe al manejo inadecuado de los archivos adjuntos de correo electr\u00f3nico cuando el an\u00e1lisis de archivos y los filtros de contenido est\u00e1n habilitados. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un correo electr\u00f3nico que contenga un archivo adjunto manipulado a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante reemplazar cualquier archivo en el sistema de archivos subyacente. Luego, el atacante podr\u00eda realizar cualquiera de las siguientes acciones: agregar usuarios con privilegios de root, modificar la configuraci\u00f3n del dispositivo, ejecutar c\u00f3digo arbitrario o provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) permanente en el dispositivo afectado. Nota: Se requiere intervenci\u00f3n manual para recuperarse de la condici\u00f3n DoS. Se recomienda a los clientes que se comuniquen con el Centro de asistencia t\u00e9cnica de Cisco (TAC) para ayudar a recuperar un dispositivo en esta condici\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-36\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH\", \"name\": \"cisco-sa-esa-afw-bGG2UsjH\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:42.233Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20401\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-17T16:55:47.665404Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:secure_email:-:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"secure_email\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"15.5.1-055\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-17T17:08:14.711Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCwj53998\"], \"advisory\": \"cisco-sa-esa-afw-bGG2UsjH\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Secure Email\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH\", \"name\": \"cisco-sa-esa-afw-bGG2UsjH\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\\r\\n\\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\\r\\n\\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-36\", \"description\": \"Absolute Path Traversal\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-07-17T16:26:38.305Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-20401\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:59:42.233Z\", \"dateReserved\": \"2023-11-08T15:08:07.660Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-07-17T16:26:38.305Z\", \"assignerShortName\": \"cisco\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-4rcj-fmjg-q9fv
Vulnerability from github
A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.
This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.
Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.
{ "affected": [], "aliases": [ "CVE-2024-20401" ], "database_specific": { "cwe_ids": [ "CWE-36" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-17T17:15:13Z", "severity": "CRITICAL" }, "details": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\n\n This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\n\n Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.", "id": "GHSA-4rcj-fmjg-q9fv", "modified": "2024-07-17T18:31:00Z", "published": "2024-07-17T18:31:00Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20401" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cisco-sa-esa-afw-bgg2usjh
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r\nThis vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r\nNote: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "This vulnerability affects Cisco Secure Email Gateway if it is running a vulnerable release of Cisco AsyncOS and both of the following conditions are met:\r\n\r\nEither the file analysis feature, which is part of Cisco Advanced Malware Protection (AMP), or the content filter feature is enabled and assigned to an incoming mail policy\r\nThe Content Scanner Tools version is earlier than 23.3.0.4823\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nDetermine Whether File Analysis is Enabled\r\n\r\nTo determine whether file analysis is enabled, complete the following steps:\r\n\r\nConnect to the product web management interface.\r\nChoose Mail Policies \u003e Incoming Mail Policies \u003e Advanced Malware Protection.\r\nChoose a Mail Policy and inspect the value of Enable File Analysis.\r\n\r\nIf the box is checked, file analysis is enabled.\r\n\r\nDetermine Whether Content Filters are Enabled\r\n\r\nTo determine whether content filters are enabled, complete the following steps:\r\n\r\nConnect to the product web interface.\r\nChoose Mail Policies \u003e Incoming Mail Policies \u003e Content Filters.\r\n\r\nIf the Content Filters column contains anything other than Disabled, content filters are enabled.\r\n\r\nDetermine the Content Scanner Tools Version\r\n\r\nTo determine which version of Content Scanner is running, use the contentscannerstatus CLI command. The following example shows a vulnerable version of Content Scanner Tools:\r\n\r\n\r\ncisco-esa\u003e contentscannerstatus\r\nComponent Version Last Updated\r\nContent Scanner Tools 23.1.0.4619.13.0.1500022 Never updated", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nSecure Email and Web Manager\r\nSecure Web Appliance", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nThe fix for this vulnerability is distributed through an updated version of the Content Scanner Tools package. Content Scanner Tools versions 23.3.0.4823 and later contain the fix for this vulnerability.\r\n\r\nThe updated version of Content Scanner Tools is included by default in Cisco AsyncOS for Cisco Secure Email Software releases 15.5.1-055 and later.\r\n Update the Content Scanner Tools\r\nUpdating the Content Scanner Tools does not require a software upgrade or a product restart. Customers who configured an automated Content Scanner Tools update may not be required to perform any action to address this vulnerability.\r\n\r\nManual Update\r\n\r\nTo manually update the Content Scanner Tools, use the command CLI contentscannerupdate, as shown in the following example:\r\n\r\n\r\ncisco-esa\u003e contentscannerupdate\r\nRequesting check for new Content Scanner updates.\r\n\r\nFor instructions on how to verify the current version, see the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nAutomatic Update\r\n\r\nTo enable automatic updates, complete the following steps on the web management interface:\r\n\r\nChoose Security Services \u003e Service Updates.\r\nClick Edit Update Settings.\r\nClick the Automatic Updates check box.\r\nClick Submit.\r\nChoose Commit Changes on the top right of the page.\r\nConfirm the uncommitted changes by clicking on Commit Changes.\r\n\r\nFor customers who use Cisco Secure Email Cloud Gateway, no action is required. Cisco has taken actions to protect the infrastructure from this vulnerability, and a fixed version of Content Scanner Tools will be deployed as part of the standard upgrade processes for the environment.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Secure Email Gateway Arbitrary File Write Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "free software updates", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "Cisco Support and Downloads page", "url": "https://www.cisco.com/c/en/us/support/index.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco Secure Email Gateway Arbitrary File Write Vulnerability", "tracking": { "current_release_date": "2024-07-17T16:00:00+00:00", "generator": { "date": "2024-07-17T16:00:18+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-esa-afw-bGG2UsjH", "initial_release_date": "2024-07-17T16:00:00+00:00", "revision_history": [ { "date": "2024-07-17T16:00:01+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Secure Email", "product": { "name": "Cisco Secure Email ", "product_id": "CSAFPID-189790" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwj53998" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189790" ] }, "release_date": "2024-07-17T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189790" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-189790" ] } ], "title": "Cisco Email Security Appliance Arbitrary File Write Vulnerability" } ] }
cisco-sa-esa-afw-bGG2UsjH
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r\nThis vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r\nNote: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "This vulnerability affects Cisco Secure Email Gateway if it is running a vulnerable release of Cisco AsyncOS and both of the following conditions are met:\r\n\r\nEither the file analysis feature, which is part of Cisco Advanced Malware Protection (AMP), or the content filter feature is enabled and assigned to an incoming mail policy\r\nThe Content Scanner Tools version is earlier than 23.3.0.4823\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nDetermine Whether File Analysis is Enabled\r\n\r\nTo determine whether file analysis is enabled, complete the following steps:\r\n\r\nConnect to the product web management interface.\r\nChoose Mail Policies \u003e Incoming Mail Policies \u003e Advanced Malware Protection.\r\nChoose a Mail Policy and inspect the value of Enable File Analysis.\r\n\r\nIf the box is checked, file analysis is enabled.\r\n\r\nDetermine Whether Content Filters are Enabled\r\n\r\nTo determine whether content filters are enabled, complete the following steps:\r\n\r\nConnect to the product web interface.\r\nChoose Mail Policies \u003e Incoming Mail Policies \u003e Content Filters.\r\n\r\nIf the Content Filters column contains anything other than Disabled, content filters are enabled.\r\n\r\nDetermine the Content Scanner Tools Version\r\n\r\nTo determine which version of Content Scanner is running, use the contentscannerstatus CLI command. The following example shows a vulnerable version of Content Scanner Tools:\r\n\r\n\r\ncisco-esa\u003e contentscannerstatus\r\nComponent Version Last Updated\r\nContent Scanner Tools 23.1.0.4619.13.0.1500022 Never updated", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nSecure Email and Web Manager\r\nSecure Web Appliance", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nThe fix for this vulnerability is distributed through an updated version of the Content Scanner Tools package. Content Scanner Tools versions 23.3.0.4823 and later contain the fix for this vulnerability.\r\n\r\nThe updated version of Content Scanner Tools is included by default in Cisco AsyncOS for Cisco Secure Email Software releases 15.5.1-055 and later.\r\n Update the Content Scanner Tools\r\nUpdating the Content Scanner Tools does not require a software upgrade or a product restart. Customers who configured an automated Content Scanner Tools update may not be required to perform any action to address this vulnerability.\r\n\r\nManual Update\r\n\r\nTo manually update the Content Scanner Tools, use the command CLI contentscannerupdate, as shown in the following example:\r\n\r\n\r\ncisco-esa\u003e contentscannerupdate\r\nRequesting check for new Content Scanner updates.\r\n\r\nFor instructions on how to verify the current version, see the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nAutomatic Update\r\n\r\nTo enable automatic updates, complete the following steps on the web management interface:\r\n\r\nChoose Security Services \u003e Service Updates.\r\nClick Edit Update Settings.\r\nClick the Automatic Updates check box.\r\nClick Submit.\r\nChoose Commit Changes on the top right of the page.\r\nConfirm the uncommitted changes by clicking on Commit Changes.\r\n\r\nFor customers who use Cisco Secure Email Cloud Gateway, no action is required. Cisco has taken actions to protect the infrastructure from this vulnerability, and a fixed version of Content Scanner Tools will be deployed as part of the standard upgrade processes for the environment.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Secure Email Gateway Arbitrary File Write Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "free software updates", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "Cisco Support and Downloads page", "url": "https://www.cisco.com/c/en/us/support/index.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco Secure Email Gateway Arbitrary File Write Vulnerability", "tracking": { "current_release_date": "2024-07-17T16:00:00+00:00", "generator": { "date": "2024-07-17T16:00:18+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-esa-afw-bGG2UsjH", "initial_release_date": "2024-07-17T16:00:00+00:00", "revision_history": [ { "date": "2024-07-17T16:00:01+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Secure Email", "product": { "name": "Cisco Secure Email ", "product_id": "CSAFPID-189790" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwj53998" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189790" ] }, "release_date": "2024-07-17T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189790" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-189790" ] } ], "title": "Cisco Email Security Appliance Arbitrary File Write Vulnerability" } ] }
wid-sec-w-2024-1669
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Cisco Secure Email Gateway ist eine Sicherheitsl\u00f6sung zum Schutz der E-Mail Kommunikation.\r\nCisco AsyncOS ist ein Betriebssystem f\u00fcr Cisco Appliances.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Cisco Secure Email Gateway und Cisco AsyncOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1669 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1669.json" }, { "category": "self", "summary": "WID-SEC-2024-1669 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1669" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-07-17", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-07-17", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "source_lang": "en-US", "title": "Cisco Secure Email Gateway: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2024-07-17T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:35.114+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1669", "initial_release_date": "2024-07-17T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c14.2.3-027", "product": { "name": "Cisco AsyncOS \u003c14.2.3-027", "product_id": "T036344" } }, { "category": "product_version_range", "name": "\u003c15.0.0-097", "product": { "name": "Cisco AsyncOS \u003c15.0.0-097", "product_id": "T036345" } }, { "category": "product_version_range", "name": "\u003c15.5.1-055", "product": { "name": "Cisco AsyncOS \u003c15.5.1-055", "product_id": "T036348" } } ], "category": "product_name", "name": "AsyncOS" }, { "branches": [ { "category": "product_version_range", "name": "Content Scanner Tools \u003c23.3.0.4823", "product": { "name": "Cisco Secure Email Gateway Content Scanner Tools \u003c23.3.0.4823", "product_id": "T036341" } }, { "category": "product_name", "name": "Cisco Secure Email Gateway", "product": { "name": "Cisco Secure Email Gateway", "product_id": "T036349", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_email_gateway:-" } } } ], "category": "product_name", "name": "Secure Email Gateway" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco Secure Email Gateway, die das Scannen von Inhalten und das Filtern von Nachrichten betrifft. Diese Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Behandlung von E-Mail-Anh\u00e4ngen, wodurch beliebige Dateien \u00fcberschrieben werden k\u00f6nnen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Code mit Systemprivilegien auszuf\u00fchren, Benutzer mit Root-Rechten hinzuzuf\u00fcgen, Ger\u00e4tekonfigurationen zu \u00e4ndern und einen permanenten Denial-of-Service Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036349" ] }, "release_date": "2024-07-17T22:00:00.000+00:00", "title": "CVE-2024-20401" }, { "cve": "CVE-2024-20429", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco Secure Email Gateway. Diese Fehler betrifft die webbasierte Verwaltungsschnittstelle von Cisco AsyncOS aufgrund einer unzureichenden Eingabevalidierung, wodurch eine b\u00f6sartige HTTP-Anfrage an das betroffene Ger\u00e4t gesendet werden k\u00f6nnte. Ein entfernter, authentisierter Angreifer mit mindestens Operator-Zugangsdaten kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code mit Root-Rechten ausnutzen." } ], "product_status": { "known_affected": [ "T036349" ] }, "release_date": "2024-07-17T22:00:00.000+00:00", "title": "CVE-2024-20429" } ] }
WID-SEC-W-2024-1669
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Cisco Secure Email Gateway ist eine Sicherheitsl\u00f6sung zum Schutz der E-Mail Kommunikation.\r\nCisco AsyncOS ist ein Betriebssystem f\u00fcr Cisco Appliances.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Cisco Secure Email Gateway und Cisco AsyncOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1669 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1669.json" }, { "category": "self", "summary": "WID-SEC-2024-1669 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1669" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-07-17", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-07-17", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "source_lang": "en-US", "title": "Cisco Secure Email Gateway: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2024-07-17T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:35.114+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1669", "initial_release_date": "2024-07-17T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c14.2.3-027", "product": { "name": "Cisco AsyncOS \u003c14.2.3-027", "product_id": "T036344" } }, { "category": "product_version_range", "name": "\u003c15.0.0-097", "product": { "name": "Cisco AsyncOS \u003c15.0.0-097", "product_id": "T036345" } }, { "category": "product_version_range", "name": "\u003c15.5.1-055", "product": { "name": "Cisco AsyncOS \u003c15.5.1-055", "product_id": "T036348" } } ], "category": "product_name", "name": "AsyncOS" }, { "branches": [ { "category": "product_version_range", "name": "Content Scanner Tools \u003c23.3.0.4823", "product": { "name": "Cisco Secure Email Gateway Content Scanner Tools \u003c23.3.0.4823", "product_id": "T036341" } }, { "category": "product_name", "name": "Cisco Secure Email Gateway", "product": { "name": "Cisco Secure Email Gateway", "product_id": "T036349", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_email_gateway:-" } } } ], "category": "product_name", "name": "Secure Email Gateway" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco Secure Email Gateway, die das Scannen von Inhalten und das Filtern von Nachrichten betrifft. Diese Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Behandlung von E-Mail-Anh\u00e4ngen, wodurch beliebige Dateien \u00fcberschrieben werden k\u00f6nnen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Code mit Systemprivilegien auszuf\u00fchren, Benutzer mit Root-Rechten hinzuzuf\u00fcgen, Ger\u00e4tekonfigurationen zu \u00e4ndern und einen permanenten Denial-of-Service Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036349" ] }, "release_date": "2024-07-17T22:00:00.000+00:00", "title": "CVE-2024-20401" }, { "cve": "CVE-2024-20429", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco Secure Email Gateway. Diese Fehler betrifft die webbasierte Verwaltungsschnittstelle von Cisco AsyncOS aufgrund einer unzureichenden Eingabevalidierung, wodurch eine b\u00f6sartige HTTP-Anfrage an das betroffene Ger\u00e4t gesendet werden k\u00f6nnte. Ein entfernter, authentisierter Angreifer mit mindestens Operator-Zugangsdaten kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code mit Root-Rechten ausnutzen." } ], "product_status": { "known_affected": [ "T036349" ] }, "release_date": "2024-07-17T22:00:00.000+00:00", "title": "CVE-2024-20429" } ] }
ncsc-2024-0311
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn twee kwetsbaarheden verholpen in Cisco Secure Email Gateway.", "title": "Feiten" }, { "category": "description", "text": "De meest ernstige kwetsbaarheid betreft CVE-2024-20401 en stelt een ongeauthenticeerde kwaadwillende in staat om middels het versturen van een mail met speciaal geprepareerde bijlage:\n\n* Gebruikers met root rechten toe te voegen\n* De configuratie van het apparaat aan te passen\n* (Remote) code uit te voeren\n* Een permanente Denial of Service (DoS) te veroorzaken.\n\nCVE-2024-20429 betreft een Server-Side Template Injection en stelt een geauthenticeerde kwaadwillende met \u0027Operator\u0027 rechten in staat om op afstand code uit te voeren met root-rechten op het onderliggende OS.", "title": "Interpretaties" }, { "category": "description", "text": "Cisco heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "high", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Absolute Path Traversal", "title": "CWE-36" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20401" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20429" }, { "category": "external", "summary": "Source - cveprojectv5", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20401" }, { "category": "external", "summary": "Source - cveprojectv5", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20429" }, { "category": "external", "summary": "Reference - certbundde; cisco; cveprojectv5; nvd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Reference - certbundde; cisco; cveprojectv5; nvd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "title": "Kwetsbaarheden verholpen in Cisco Secure Email Gateway", "tracking": { "current_release_date": "2024-07-18T12:46:34.019785Z", "id": "NCSC-2024-0311", "initial_release_date": "2024-07-18T12:46:34.019785Z", "revision_history": [ { "date": "2024-07-18T12:46:34.019785Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465935", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.0.3-238:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465936", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-069:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465938", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-128:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465937", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-131:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465939", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.0.0-419:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465940", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-071:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465941", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-087:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465942", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-089:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465947", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.0-066:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465949", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.3-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465948", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.4-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465943", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.0.0-392:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465944", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.0.5-007:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465945", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.5.1-277:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465946", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.5.4-038:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465950", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.0.0-698:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465951", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.2.0-620:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465952", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.2.1-020:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1504833", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505508", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505509", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.0.3-238:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505510", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-069:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505511", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-128:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505512", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-131:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505513", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.0-419:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505514", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-071:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505515", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-087:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505516", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-089:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505517", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.0-066:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505518", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.3-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505519", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.4-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505520", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.0-392:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505521", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.0.5-007:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505522", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.5.1-277:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505523", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.5.4-038:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505524", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.0-698:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505525", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.2.0-620:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505526", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.2.1-020:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "cwe": { "id": "CWE-36", "name": "Absolute Path Traversal" }, "notes": [ { "category": "other", "text": "Absolute Path Traversal", "title": "CWE-36" } ], "product_status": { "known_affected": [ "CSAFPID-1504833" ] }, "references": [ { "category": "self", "summary": "CVE-2024-20401", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20401.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1504833" ] } ], "title": "CVE-2024-20401" }, { "cve": "CVE-2024-20429", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1465935", "CSAFPID-1465936", "CSAFPID-1465937", "CSAFPID-1465938", "CSAFPID-1465939", "CSAFPID-1465940", "CSAFPID-1465941", "CSAFPID-1465942", "CSAFPID-1465943", "CSAFPID-1465944", "CSAFPID-1465945", "CSAFPID-1465946", "CSAFPID-1465947", "CSAFPID-1465948", "CSAFPID-1465949", "CSAFPID-1465950", "CSAFPID-1465951", "CSAFPID-1465952" ] }, "references": [ { "category": "self", "summary": "CVE-2024-20429", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20429.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1465935", "CSAFPID-1465936", "CSAFPID-1465937", "CSAFPID-1465938", "CSAFPID-1465939", "CSAFPID-1465940", "CSAFPID-1465941", "CSAFPID-1465942", "CSAFPID-1465943", "CSAFPID-1465944", "CSAFPID-1465945", "CSAFPID-1465946", "CSAFPID-1465947", "CSAFPID-1465948", "CSAFPID-1465949", "CSAFPID-1465950", "CSAFPID-1465951", "CSAFPID-1465952" ] } ], "title": "CVE-2024-20429" } ] }
NCSC-2024-0311
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn twee kwetsbaarheden verholpen in Cisco Secure Email Gateway.", "title": "Feiten" }, { "category": "description", "text": "De meest ernstige kwetsbaarheid betreft CVE-2024-20401 en stelt een ongeauthenticeerde kwaadwillende in staat om middels het versturen van een mail met speciaal geprepareerde bijlage:\n\n* Gebruikers met root rechten toe te voegen\n* De configuratie van het apparaat aan te passen\n* (Remote) code uit te voeren\n* Een permanente Denial of Service (DoS) te veroorzaken.\n\nCVE-2024-20429 betreft een Server-Side Template Injection en stelt een geauthenticeerde kwaadwillende met \u0027Operator\u0027 rechten in staat om op afstand code uit te voeren met root-rechten op het onderliggende OS.", "title": "Interpretaties" }, { "category": "description", "text": "Cisco heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "high", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Absolute Path Traversal", "title": "CWE-36" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20401" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20429" }, { "category": "external", "summary": "Source - cveprojectv5", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20401" }, { "category": "external", "summary": "Source - cveprojectv5", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20429" }, { "category": "external", "summary": "Reference - certbundde; cisco; cveprojectv5; nvd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "category": "external", "summary": "Reference - certbundde; cisco; cveprojectv5; nvd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ" } ], "title": "Kwetsbaarheden verholpen in Cisco Secure Email Gateway", "tracking": { "current_release_date": "2024-07-18T12:46:34.019785Z", "id": "NCSC-2024-0311", "initial_release_date": "2024-07-18T12:46:34.019785Z", "revision_history": [ { "date": "2024-07-18T12:46:34.019785Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465935", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.0.3-238:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465936", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-069:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465938", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-128:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465937", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:11.1.0-131:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465939", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.0.0-419:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465940", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-071:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465941", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-087:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465942", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.1.0-089:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465947", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.0-066:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465949", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.3-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465948", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:12.5.4-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465943", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.0.0-392:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465944", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.0.5-007:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465945", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.5.1-277:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465946", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:13.5.4-038:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465950", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.0.0-698:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465951", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.2.0-620:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1465952", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:14.2.1-020:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cisco_secure_email", "product": { "name": "cisco_secure_email", "product_id": "CSAFPID-1504833", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:cisco_secure_email:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505508", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505509", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.0.3-238:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505510", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-069:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505511", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-128:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505512", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:11.1.0-131:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505513", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.0-419:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505514", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-071:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505515", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-087:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505516", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.1.0-089:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505517", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.0-066:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505518", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.3-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505519", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:12.5.4-041:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505520", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.0-392:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505521", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.0.5-007:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505522", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.5.1-277:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505523", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:13.5.4-038:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505524", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.0-698:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505525", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.2.0-620:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_email", "product": { "name": "secure_email", "product_id": "CSAFPID-1505526", "product_identification_helper": { "cpe": "cpe:2.3:a:cisco:secure_email:14.2.1-020:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20401", "cwe": { "id": "CWE-36", "name": "Absolute Path Traversal" }, "notes": [ { "category": "other", "text": "Absolute Path Traversal", "title": "CWE-36" } ], "product_status": { "known_affected": [ "CSAFPID-1504833" ] }, "references": [ { "category": "self", "summary": "CVE-2024-20401", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20401.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1504833" ] } ], "title": "CVE-2024-20401" }, { "cve": "CVE-2024-20429", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1465935", "CSAFPID-1465936", "CSAFPID-1465937", "CSAFPID-1465938", "CSAFPID-1465939", "CSAFPID-1465940", "CSAFPID-1465941", "CSAFPID-1465942", "CSAFPID-1465943", "CSAFPID-1465944", "CSAFPID-1465945", "CSAFPID-1465946", "CSAFPID-1465947", "CSAFPID-1465948", "CSAFPID-1465949", "CSAFPID-1465950", "CSAFPID-1465951", "CSAFPID-1465952" ] }, "references": [ { "category": "self", "summary": "CVE-2024-20429", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20429.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1465935", "CSAFPID-1465936", "CSAFPID-1465937", "CSAFPID-1465938", "CSAFPID-1465939", "CSAFPID-1465940", "CSAFPID-1465941", "CSAFPID-1465942", "CSAFPID-1465943", "CSAFPID-1465944", "CSAFPID-1465945", "CSAFPID-1465946", "CSAFPID-1465947", "CSAFPID-1465948", "CSAFPID-1465949", "CSAFPID-1465950", "CSAFPID-1465951", "CSAFPID-1465952" ] } ], "title": "CVE-2024-20429" } ] }
fkie_cve-2024-20401
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition." }, { "lang": "es", "value": "Una vulnerabilidad en las funciones de escaneo de contenido y filtrado de mensajes de Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado sobrescriba archivos arbitrarios en el sistema operativo subyacente. Esta vulnerabilidad se debe al manejo inadecuado de los archivos adjuntos de correo electr\u00f3nico cuando el an\u00e1lisis de archivos y los filtros de contenido est\u00e1n habilitados. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un correo electr\u00f3nico que contenga un archivo adjunto manipulado a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante reemplazar cualquier archivo en el sistema de archivos subyacente. Luego, el atacante podr\u00eda realizar cualquiera de las siguientes acciones: agregar usuarios con privilegios de root, modificar la configuraci\u00f3n del dispositivo, ejecutar c\u00f3digo arbitrario o provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) permanente en el dispositivo afectado. Nota: Se requiere intervenci\u00f3n manual para recuperarse de la condici\u00f3n DoS. Se recomienda a los clientes que se comuniquen con el Centro de asistencia t\u00e9cnica de Cisco (TAC) para ayudar a recuperar un dispositivo en esta condici\u00f3n." } ], "id": "CVE-2024-20401", "lastModified": "2024-11-21T08:52:33.533", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-07-17T17:15:13.540", "references": [ { "source": "psirt@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-36" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
gsd-2024-20401
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2024-20401", "id": "GSD-2024-20401" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-20401" ], "id": "GSD-2024-20401", "modified": "2023-12-13T01:21:42.917036Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-20401", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.