Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12353

EPSS 0.38% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12353

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
7PK-安全功能
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Email Security Appliance Cisco AsyncOS Software Multipurpose Internet Mail Extensions scanner 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Email Security Appliance(ESA)是美国思科(Cisco)公司的一个电子邮件安全设备。AsyncOS Software是使用在其中的操作系统。Multipurpose Internet Mail Extensions(MIME)scanner是其中的一个多功能邮件扩展扫描器。 Cisco ESA中的Cisco AsyncOS Software的MIME scanner存在安全漏洞,该漏洞源于程序没有正确的处理邮件附件中畸形的MIME包头。远程攻击者可通过发送带有特制MI
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco Email Security Appliance Cisco Email Security Appliance -

II. Public POCs for CVE-2017-12353

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12353

Please Login to view more intelligence information

Same Patch Batch · n/a · 2017-11-30 · 56 CVEs total

CVE-2017-12359多款Cisco产品WebEx Advanced Recording Format Player 缓冲区错误漏洞
CVE-2017-14198Squiz Matrix 安全漏洞
CVE-2017-12370多款Cisco产品WebEx Recording Format Player和Advanced Recording Format Player 安全漏洞
CVE-2017-14196Squiz Matrix File Bridge插件路径遍历漏洞
CVE-2017-12372多款Cisco产品WebEx Recording Format Player和Advanced Recording Format Player 安全漏洞
CVE-2017-12371多款Cisco产品WebEx Recording Format Player和Advanced Recording Format Player 安全漏洞
CVE-2017-14197Squiz Matrix Matrix WYSIWYG插件跨站脚本漏洞
CVE-2017-12362Cisco Meeting Server 安全漏洞
CVE-2017-12361Cisco Jabber for Windows 信息泄露漏洞
CVE-2017-12360Cisco WebEx Business Suite meeting site和Cisco WebEx Meetings site WebEx Recording Format P
CVE-2017-12363Cisco WebEx Meeting Server 安全漏洞
CVE-2017-12358Cisco Jabber for Windows、Mac、Android和iOS Cisco Jabber 跨站脚本漏洞
CVE-2017-12357Cisco Unified Communications Manager 跨站脚本漏洞
CVE-2017-12356Cisco Jabber for Windows、Mac、Android和iOS Cisco Jabber 跨站脚本漏洞
CVE-2017-12355Cisco IOS XR Software 安全漏洞
CVE-2017-12354Cisco Secure Access Control System 信息泄露漏洞
CVE-2017-12352Cisco Application Policy Infrastructure Controller 命令注入漏洞
CVE-2017-12351多款Cisco产品NX-OS System Software 安全漏洞
CVE-2017-12349Cisco UCS Central Software 安全漏洞
CVE-2017-12348Cisco UCS Central Software 跨站脚本漏洞

Showing top 20 of 56 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-12353

No comments yet


Leave a comment