Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3132— Cisco Email Security Appliance Shortened URL Denial of Service Vulnerability

EPSS 0.91% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-3132

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Email Security Appliance Shortened URL Denial of Service Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the email message scanning feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a temporary denial of service (DoS) condition on an affected device. The vulnerability is due to inadequate parsing mechanisms for specific email body components. An attacker could exploit this vulnerability by sending a malicious email containing a high number of shortened URLs through an affected device. A successful exploit could allow the attacker to consume processing resources, causing a DoS condition on an affected device. To successfully exploit this vulnerability, certain conditions beyond the control of the attacker must occur.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Email Security Appliance和Cloud Email Security 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Email Security Appliance(ESA)是美国思科(Cisco)公司的一个电子邮件安全设备。 Cisco ESA和Cisco Cloud Email Security 12.5.1-037之前版本和13.0.0-375之前版本中的邮件消息扫描功能存在资源管理错误漏洞,该漏洞源于源于不正确的解析机制。攻击者可通过从受影响的设备发送大量恶意电子邮件来利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Email Security Appliance (ESA) unspecified ~ n/a -

II. Public POCs for CVE-2020-3132

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-3132

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-02-19 · 15 CVEs total

CVE-2019-19508.4 HIGHCisco IOS XE SD-WAN Software Default Credentials Vulnerability
CVE-2020-31566.1 MEDIUMCisco Identity Services Engine Cross-Site Scripting Vulnerability
CVE-2015-07494.3 MEDIUMCisco Unified Communications Manager Cross-Site Scripting Vulnerability
CVE-2011-20544.3 MEDIUMCisco ASA Secondary Authentication Bypass Vulnerability
CVE-2020-3163Cisco Unified Contact Center Enterprise Denial of Service Vulnerability
CVE-2020-3160Cisco Meeting Server Extensible Messaging and Presence Protocol Denial of Service Vulnerab
CVE-2020-3159Cisco Finesse Web-Based Management Interface Cross-Site Scripting Vulnerability
CVE-2020-3158Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability
CVE-2020-3154Cisco Cloud Web Security SQL Injection Vulnerability
CVE-2020-3153Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
CVE-2020-3138Cisco Enterprise NFV Infrastructure Software Remote Code Execution Vulnerability
CVE-2020-3114Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability
CVE-2020-3112Cisco Data Center Network Manager Privilege Escalation Vulnerability
CVE-2020-3113Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2020-3132

No comments yet


Leave a comment