QID 317135

Date Published: 2022-02-21

QID 317135: Cisco Email Security Appliance Domain Name System (DNS) Verification Denial of Service (DoS) Vulnerability (cisco-sa-esa-dos-MxZvGtgU)

A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

Affected Products
Prior to release 13.0.3
From 13.5 prior to 13.5.4.102
From 14.0 prior to 14.0.2.020
Note: This vulnerability affects Cisco ESA devices if they are running a vulnerable release of Cisco AsyncOS Software with the DANE feature enabled and with the downstream mail servers configured to send bounce messages.

QID Detection Logic (Authenticated):
The check matches Cisco ESA version retrieved using "show version" command.

Successful exploitation could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.1 severity.
  • Solution

    Customers are advised to refer to cisco-sa-esa-dos-MxZvGtgU for more information.

    CVEs related to QID 317135

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-esa-dos-MxZvGtgU URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU