5.8
CVE-2017-3827
- EPSS 0.36%
- Veröffentlicht 22.02.2017 02:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Web Security Appliance Version10.0.0-082
Cisco ≫ Web Security Appliance Version10.0.0-124
Cisco ≫ Web Security Appliance Version10.0.0-125
Cisco ≫ Web Security Appliance Version10.0.0-203
Cisco ≫ Web Security Appliance Version10.0.0-232
Cisco ≫ Email Security Appliance Firmware Version9.9.6-026
Cisco ≫ Email Security Appliance Firmware Version9.9.9-894
Cisco ≫ Email Security Appliance Firmware Version10.0.0-082
Cisco ≫ Email Security Appliance Firmware Version10.0.0-124
Cisco ≫ Email Security Appliance Firmware Version10.0.0-125
Cisco ≫ Email Security Appliance Firmware Version10.0.0-203
Cisco ≫ Email Security Appliance Firmware Version10.0.0-232
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.36% | 0.553 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.8 | 3.9 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.