QID 317198

Date Published: 2022-06-16

QID 317198: Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability (cisco-sa-sma-esa-auth-bypass-66kEcxQD)

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device.

Affected Products
Cisco ESA, Cisco SMA, if they are running a vulnerable release of Cisco AsyncOS Software and the following are true:
The devices are configured to use external authentication.
The devices use LDAP as authentication protocol.
Note: This QID is not checking for workarounds.

QID Detection Logic (Authenticated):
The check matches Cisco ESA OS version and Cisco SMA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sma-esa-auth-bypass-66kEcxQD for more information.

    CVEs related to QID 317198

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sma-esa-auth-bypass-66kEcxQD URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-esa-auth-bypass-66kEcxQD