Cisco Advanced Malware Protection and Email Security Appliance Proxy Engine Security Bypass Vulnerability

2016-02-11T14:27:00
ID CISCO-SA-20160211-ESAAMP
Type cisco
Reporter Cisco
Modified 2016-02-11T14:27:11

Description

A vulnerability in the proxy engine of the Cisco Advanced Malware Protection (AMP) and the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass security restrictions.

The vulnerability is due to improper handling of malformed file methods. An attacker could exploit this vulnerability by encoding files within an email message. An exploit could allow the attacker to circumvent the AMP’s or ESA’s ability to prevent encoded files.

A vulnerability in the proxy engine of the Cisco Advanced Malware Protection (AMP) and the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass security restrictions.

The vulnerability is due to improper handling of malformed file methods. An attacker could exploit this vulnerability by encoding files within an email message. An exploit could allow the attacker to circumvent the AMP?s or ESA?s ability to prevent encoded files.

Cisco has not released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaamp["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaamp"]