This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2015-08-19
Product Content Security Management Appliance Last view 2021-05-06
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-103:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-004:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:content_security_management_appliance:-:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-033:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-031:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:content_security_management_appliance:9.6.0:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:content_security_management_appliance:8.1.1-033:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.3.6-039:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:9.0.0-073:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:9.5.0:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:10.0.0-203:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:10.1.0-049:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:10.1.0-037:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:11.4.0-812:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.4.0-150:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-31:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:7.8_base:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.1.2-000:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.2.0-238:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:7.8.0-328:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:7.8.1-001:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.3.0-350:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.3.5-061:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:7.9.0-201:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:7.9.2-116:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.0.1-031:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.3.6-014:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.3.7-010:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:8.1.0-001:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:content_security_management_appliance:*:*:*:*:*:*:*:* 6
cpe:2.3:a:cisco:content_security_management_appliance:12.5.0:*:*:*:*:*:*:* 6

Related : CVE

  Date Alert Description
6.5 2021-05-06 CVE-2021-1516

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.

6.7 2021-05-06 CVE-2021-1447

A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.

5.3 2021-01-20 CVE-2021-1129

A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure.

4.7 2020-09-23 CVE-2020-3117

A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser.

5.3 2020-09-23 CVE-2019-1983

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation.

6.5 2020-08-17 CVE-2020-3447

A vulnerability in the CLI of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to excessive verbosity in certain log subscriptions. An attacker could exploit this vulnerability by accessing specific log files on an affected device. A successful exploit could allow the attacker to obtain sensitive log data, which may include user credentials. To exploit this vulnerability, the attacker would need to have valid credentials at the operator level or higher on the affected device.

6.1 2020-05-06 CVE-2020-3178

Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites.

5.3 2020-03-04 CVE-2020-3164

A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific HTTP request headers. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to trigger a prolonged status of high CPU utilization relative to the GUI process(es). Upon successful exploitation of this vulnerability, an affected device will still be operative, but its response time and overall performance may be degraded.

4.3 2019-09-04 CVE-2019-12635

A vulnerability in the authorization module of Cisco Content Security Management Appliance (SMA) Software could allow an authenticated, remote attacker to gain out-of-scope access to email. The vulnerability exists because the affected software does not correctly implement role permission controls. An attacker could exploit this vulnerability by using a custom role with specific permissions. A successful exploit could allow the attacker to access the spam quarantine of other users.

6.1 2018-11-08 CVE-2018-15393

A vulnerability in the web-based management interface of Cisco Content Security Management Appliance (SMA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

4.3 2017-08-17 CVE-2017-6783

A vulnerability in SNMP polling for the Cisco Web Security Appliance (WSA), Email Security Appliance (ESA), and Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to discover confidential information about the appliances that should be available only to an administrative user. The vulnerability occurs because the appliances do not protect confidential information at rest in response to Simple Network Management Protocol (SNMP) poll requests. An attacker could exploit this vulnerability by doing a crafted SNMP poll request to the targeted security appliance. An exploit could allow the attacker to discover confidential information that should be restricted, and the attacker could use this information to conduct additional reconnaissance. The attacker must know the configured SNMP community string to exploit this vulnerability. Cisco Bug IDs: CSCve26106, CSCve26202, CSCve26224. Known Affected Releases: 10.0.0-230 (Web Security Appliance), 9.7.2-065 (Email Security Appliance), and 10.1.0-037 (Content Security Management Appliance).

6.1 2017-06-13 CVE-2017-6661

A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device, aka Message Tracking XSS. More Information: CSCvd30805 CSCvd34861. Known Affected Releases: 10.0.0-203 10.1.0-049.

5.9 2016-12-13 CVE-2016-1411

A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019.

5.9 2016-10-05 CVE-2016-6416

The FTP service in Cisco AsyncOS on Email Security Appliance (ESA) devices 9.6.0-000 through 9.9.6-026, Web Security Appliance (WSA) devices 9.0.0-162 through 9.5.0-444, and Content Security Management Appliance (SMA) devices allows remote attackers to cause a denial of service via a flood of FTP traffic, aka Bug IDs CSCuz82907, CSCuz84330, and CSCuz86065.

7.5 2016-08-31 CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

7.8 2015-11-05 CVE-2015-6321

Cisco AsyncOS before 8.5.7-042, 9.x before 9.1.0-032, 9.1.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-042 on Email Security Appliance (ESA) devices; before 9.1.0-032, 9.1.1 before 9.1.1-005, and 9.5.x before 9.5.0-025 on Content Security Management Appliance (SMA) devices; and before 7.7.0-725 and 8.x before 8.0.8-113 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets, aka Bug IDs CSCus79774, CSCus79777, and CSCzv95795.

5 2015-09-13 CVE-2015-6288

Cisco Content Security Management Appliance (SMA) 7.8.0-000 does not properly validate credentials, which allows remote attackers to cause a denial of service (rapid log-file rollover and application fault) via crafted HTTP requests, aka Bug ID CSCuw09620.

5.5 2015-08-19 CVE-2015-4322

Cisco Content Security Management Appliance (SMA) 8.3.6-039, 9.1.0-31, and 9.1.0-103 improperly restricts the privileges available after LDAP authentication, which allows remote authenticated users to read or write to an arbitrary user's Spam Quarantine folder by visiting a spam-notification URL, aka Bug ID CSCuv65894.

CWE : Common Weakness Enumeration

%idName
11% (2) CWE-399 Resource Management Errors
11% (2) CWE-200 Information Exposure
11% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
11% (2) CWE-20 Improper Input Validation
5% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
5% (1) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
5% (1) CWE-540 Information Leak Through Source Code
5% (1) CWE-532 Information Leak Through Log Files
5% (1) CWE-310 Cryptographic Issues
5% (1) CWE-269 Improper Privilege Management
5% (1) CWE-264 Permissions, Privileges, and Access Controls
5% (1) CWE-201 Information Leak Through Sent Data
5% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Snort® IPS/IDS

Date Description
2020-12-05 Cisco Email Security Appliance mail log parsing denial of service attempt
RuleID : 53170 - Type : SERVER-OTHER - Revision : 1
2016-10-18 SSH weak blowfish cipher suite use attempt
RuleID : 40190 - Type : POLICY-OTHER - Revision : 2
2016-10-18 SSH weak 3DES cipher suite use attempt
RuleID : 40189 - Type : POLICY-OTHER - Revision : 2
2016-10-18 SSL weak 3DES cipher suite use attempt
RuleID : 40188 - Type : POLICY-OTHER - Revision : 2
2016-10-18 SSL weak 3DES cipher suite use attempt
RuleID : 40187 - Type : POLICY-OTHER - Revision : 2
2016-10-18 SSL weak 3DES cipher suite use attempt
RuleID : 40186 - Type : POLICY-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2123.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The version of Arista Networks EOS running on the remote device is affected b...
File: arista_eos_sa0024.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The version of Arista Networks EOS running on the remote device is affected b...
File: arista_eos_sa0024_4_17.nasl - Type: ACT_GATHER_INFO
2017-11-20 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-3240.nasl - Type: ACT_GATHER_INFO
2017-11-08 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-3113.nasl - Type: ACT_GATHER_INFO
2017-09-20 Name: The remote VMware ESXi 6.0 host is affected by multiple vulnerabilities.
File: vmware_esxi_6_0_build_5485776_remote.nasl - Type: ACT_GATHER_INFO
2017-09-15 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-2709.nasl - Type: ACT_GATHER_INFO
2017-09-15 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-2710.nasl - Type: ACT_GATHER_INFO
2017-09-13 Name: The version of Java SDK installed on the remote AIX host is affected by multi...
File: aix_java_jan2017_advisory.nasl - Type: ACT_GATHER_INFO
2017-07-20 Name: A web application installed on the remote host is affected by multiple vulner...
File: oracle_e-business_cpu_jul_2017.nasl - Type: ACT_GATHER_INFO
2017-07-20 Name: The remote database server is affected by multiple vulnerabilities.
File: oracle_rdbms_cpu_jul_2017.nasl - Type: ACT_GATHER_INFO
2017-07-13 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-0180.nasl - Type: ACT_GATHER_INFO
2017-07-13 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-0269.nasl - Type: ACT_GATHER_INFO
2017-07-06 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201707-01.nasl - Type: ACT_GATHER_INFO
2017-06-26 Name: The Tenable SecurityCenter application on the remote host contains an OpenSSL...
File: securitycenter_openssl_1_0_1u.nasl - Type: ACT_GATHER_INFO
2017-05-31 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-1444-1.nasl - Type: ACT_GATHER_INFO
2017-05-24 Name: A database server installed on the remote host is affected by multiple vulner...
File: ibm_informix_server_swg22002897.nasl - Type: ACT_GATHER_INFO
2017-05-10 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-1216.nasl - Type: ACT_GATHER_INFO
2017-05-02 Name: An application installed on the remote host is affected by multiple vulnerabi...
File: oracle_secure_global_desktop_apr_2017_cpu.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2016-1090.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1015.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1016.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1027.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1028.nasl - Type: ACT_GATHER_INFO
2017-04-28 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3270-1.nasl - Type: ACT_GATHER_INFO