Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F97C8DE-48FA-4609-BF07-8E6AD4C34322", "versionEndExcluding": "14.0.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device."}, {"lang": "es", "value": "Una vulnerabilidad en los mecanismos de protecci\u00f3n antispam del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podr\u00eda permitir a un atacante remoto no autenticado omitir los filtros de reputaci\u00f3n de URL en un dispositivo afectado. Esta vulnerabilidad es debido al procesamiento inapropiado de las URL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una URL de una manera particular. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir los filtros de reputaci\u00f3n de URL que est\u00e1n configurados para un dispositivo afectado, lo que podr\u00eda permitir el paso de URLs maliciosas mediante el dispositivo"}], "id": "CVE-2021-1534", "lastModified": "2024-11-21T05:44:34.010", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-10-06T20:15:07.657", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "ykramarz@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}