7.5

CVE-2021-34741

A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoAsyncos Version < 13.0.4
   CiscoM170 Version-
   CiscoM190 Version-
   CiscoM380 Version-
   CiscoM390 Version-
   CiscoM390x Version-
   CiscoM680 Version-
   CiscoM690 Version-
   CiscoM690x Version-
   CiscoS195 Version-
   CiscoS395 Version-
   CiscoS695 Version-
CiscoAsyncos Version13.5.3-010
   CiscoM170 Version-
   CiscoM190 Version-
   CiscoM380 Version-
   CiscoM390 Version-
   CiscoM390x Version-
   CiscoM680 Version-
   CiscoM690 Version-
   CiscoM690x Version-
   CiscoS195 Version-
   CiscoS395 Version-
   CiscoS695 Version-
CiscoAsyncos Version13.7.0-093
   CiscoM170 Version-
   CiscoM190 Version-
   CiscoM380 Version-
   CiscoM390 Version-
   CiscoM390x Version-
   CiscoM680 Version-
   CiscoM690 Version-
   CiscoM690x Version-
   CiscoS195 Version-
   CiscoS395 Version-
   CiscoS695 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.24% 0.44
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
psirt@cisco.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.