SB2019100220 - Filter Bypass in Cisco AsyncOS for Cisco Email Security Appliance



SB2019100220 - Filter Bypass in Cisco AsyncOS for Cisco Email Security Appliance

Published: October 2, 2019 Updated: February 20, 2020

Security Bulletin ID SB2019100220
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2019-12706)

The vulnerability allows a remote attacker to bypass the configured user filters on an affected device.

The vulnerability exists within the Sender Policy Framework (SPF) functionality due to the affected software insufficiently validates certain incoming SPF messages. A remote attacker can send a custom SPF packet to an affected device and bypass the configured header filters, which could allow malicious content to pass through the device.


Remediation

Install update from vendor's website.