Lucene search

K
ciscoCiscoCISCO-SA-20141014-CVE-2014-3381
HistoryOct 14, 2014 - 4:13 p.m.

Cisco AsyncOS Software ZIP Filtering Bypass Vulnerability

2014-10-1416:13:59
tools.cisco.com
12

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

58.8%

A vulnerability in the ZIP inspection engine of Cisco AsyncOS for Cisco Email Security
Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the engine protection and deliver malicious ZIP files.

The
vulnerability is due to improper implementation of the logic for analyzing
the content of a ZIP file. An attacker could exploit this vulnerability by crafting the ZIP file before sending it through the system.

Cisco has confirmed the vulnerability in a security notice and released software updates.

An exploit of this vulnerability could allow an attacker to bypass security restrictions on a targeted system, which could be used to send malicious ZIP files to be processed by the system. Processing the malicious ZIP files could be used to conduct further attacks.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoemail_security_applianceMatchany
OR
ciscoemail_security_applianceMatchany
VendorProductVersionCPE
ciscoemail_security_applianceanycpe:2.3:h:cisco:email_security_appliance:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

58.8%

Related for CISCO-SA-20141014-CVE-2014-3381