Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-20401

CVSS 9.8 · Critical EPSS 7.66% · P92
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-20401

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system. This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device. Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
绝对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Secure Email 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Secure Email是美国思科(Cisco)公司的思科安全电子邮件(前身为电子邮件安全)为您的电子邮件提供最佳保护,使其免受网络威胁。 Cisco Secure Email 存在安全漏洞,该漏洞源于在启用文件分析和内容过滤器时对电子邮件附件处理不当。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Secure Email N/A -

II. Public POCs for CVE-2024-20401

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-20401

登录查看更多情报信息。

Same Patch Batch · Cisco · 2024-07-17 · 10 CVEs total

CVE-2024-2041910.0 CRITICALCisco Smart Software Manager On-Prem 安全漏洞
CVE-2024-204358.8 HIGHCisco AsyncOS 安全漏洞
CVE-2024-203237.5 HIGHCisco Intelligent Node 安全漏洞
CVE-2024-204166.5 MEDIUMCisco RV340 和 Cisco RV345 安全漏洞
CVE-2024-204296.5 MEDIUMCisco Secure Email 安全漏洞
CVE-2024-203956.4 MEDIUMCisco Webex 安全漏洞
CVE-2024-203965.3 MEDIUMCisco Webex 安全漏洞
CVE-2024-202964.7 MEDIUMCisco Identity Services Engine 安全漏洞
CVE-2024-204004.7 MEDIUMCisco Expressway Series 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-20401

No comments yet


Leave a comment