QID 317135
Date Published: 2022-02-21
QID 317135: Cisco Email Security Appliance Domain Name System (DNS) Verification Denial of Service (DoS) Vulnerability (cisco-sa-esa-dos-MxZvGtgU)
A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
Affected Products
Prior to release 13.0.3
From 13.5 prior to 13.5.4.102
From 14.0 prior to 14.0.2.020
Note: This vulnerability affects Cisco ESA devices if they are running a vulnerable release of Cisco AsyncOS Software with the DANE feature enabled and with the downstream mail servers configured to send bounce messages.
QID Detection Logic (Authenticated):
The check matches Cisco ESA version retrieved using "show version" command.
Successful exploitation could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
Customers are advised to refer to cisco-sa-esa-dos-MxZvGtgU for more information.
- cisco-sa-esa-dos-MxZvGtgU -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU
CVEs related to QID 317135
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-esa-dos-MxZvGtgU |
|