CVE-2020-26082
Summary
| CVE | CVE-2020-26082 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-04 21:15:00 UTC |
| Updated | 2024-01-25 17:15:00 UTC |
| Description | A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device. The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Cisco | Asyncos | All | All | All | All |
| Hardware | Cisco | Email Security Appliance C170 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C190 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C380 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C390 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C680 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C690 | - | All | All | All |
| Hardware | Cisco | Email Security Appliance C690x | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Email Security Appliance Zip Content Filter Bypass Vulnerability | MISC | sec.cloudapps.cisco.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.