Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1933— Cisco Email Security Appliance Content Filter Bypass Vulnerability

EPSS 0.21% · P44
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-1933

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Email Security Appliance Content Filter Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient's email client is configured to execute scripts contained in emails.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Email Security Appliance AsyncOS Software 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Email Security Appliance(ESA)是美国思科(Cisco)公司的一个电子邮件安全设备。AsyncOS Software是运行在其中的一套操作系统。 Cisco ESA中的AsyncOS Software的邮件消息的扫描存在输入验证错误漏洞,该漏洞源于程序没有对邮件字段执行正确的输入验证。远程攻击者可通过向受ESA保护的用户发送特制的邮件消息利用该漏洞绕过所配置的过滤器并在邮件内容中注入任意脚本代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Email Security Appliance (ESA) 11.1.2-023 -

II. Public POCs for CVE-2019-1933

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-1933

登录查看更多情报信息。

Same Patch Batch · Cisco · 2019-07-06 · 13 CVEs total

CVE-2019-1930Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities
CVE-2019-1931Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities
CVE-2019-1932Cisco Advanced Malware Protection for Endpoints Windows Command Injection Vulnerability
CVE-2019-1921Cisco Email Security Appliance Content Filter Bypass Vulnerability
CVE-2019-1922Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerab
CVE-2019-1893Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability
CVE-2019-1894Cisco Enterprise NFV Infrastructure Software Arbitrary File Read and Write Vulnerability
CVE-2019-1909Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability
CVE-2019-1911Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability
CVE-2019-1887Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnera
CVE-2019-1891Cisco Small Business Series Switches HTTP Denial of Service Vulnerability
CVE-2019-1892Cisco Small Business Series Switches Memory Corruption Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2019-1933

No comments yet


Leave a comment