(I)IoT Security News
Critical vulnerabiliities, Cyber Security, IoT Security, Vulnerabilities

Cisco Secure Email Gateway Arbitrary File Write Vulnerability

Cisco Smart Licensing Utility Vulnerabilities

Summary

A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.

This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.

Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Affected Products

Vulnerable Products

This vulnerability affects Cisco Secure Email Gateway if it is running a vulnerable release of Cisco AsyncOS and both of the following conditions are met:

For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory.

Determine Whether File Analysis is Enabled

To determine whether file analysis is enabled, complete the following steps:

  1. Connect to the product web management interface.
  2. Choose Mail Policies > Incoming Mail Policies > Advanced Malware Protection.
  3. Choose a Mail Policy and inspect the value of Enable File Analysis.

If the box is checked, file analysis is enabled.

Determine Whether Content Filters are Enabled

To determine whether content filters are enabled, complete the following steps:

  1. Connect to the product web interface.
  2. Choose Mail Policies > Incoming Mail Policies > Content Filters.

If the Content Filters column contains anything other than Disabled, content filters are enabled.

Determine the Content Scanner Tools Version

To determine which version of Content Scanner is running, use the contentscannerstatus CLI command. The following example shows a vulnerable version of Content Scanner Tools:

cisco-esa> contentscannerstatus
Component Version Last Updated
Content Scanner Tools 23.1.0.4619.13.0.1500022 Never updated

Products Confirmed Not Vulnerable

Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability.

Cisco has confirmed that this vulnerability does not affect the following Cisco products:

Workarounds

Fixed Software

Customers Without Service Contracts

Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.

Fixed Releases

The fix for this vulnerability is distributed through an updated version of the Content Scanner Tools package. Content Scanner Tools versions 23.3.0.4823 and later contain the fix for this vulnerability.

The updated version of Content Scanner Tools is included by default in Cisco AsyncOS for Cisco Secure Email Software releases 15.5.1-055 and later.

Update the Content Scanner Tools

Updating the Content Scanner Tools does not require a software upgrade or a product restart. Customers who configured an automated Content Scanner Tools update may not be required to perform any action to address this vulnerability.

Manual Update

To manually update the Content Scanner Tools, use the command CLI contentscannerupdate, as shown in the following example:

cisco-esa> contentscannerupdate
Requesting check for new Content Scanner updates.

For instructions on how to verify the current version, see the Vulnerable Products section of this advisory.

Automatic Update

To enable automatic updates, complete the following steps on the web management interface:

  1. Choose Security Services > Service Updates.
  2. Click Edit Update Settings.
  3. Click the Automatic Updates check box.
  4. Click Submit.
  5. Choose Commit Changes on the top right of the page.
  6. Confirm the uncommitted changes by clicking on Commit Changes.

For customers who use Cisco Secure Email Cloud Gateway, no action is required. Cisco has taken actions to protect the infrastructure from this vulnerability, and a fixed version of Content Scanner Tools will be deployed as part of the standard upgrade processes for the environment.

The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.

Exploitation and Public Announcements

Source

URL

Source:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH

Related posts

Cisco Releases Security Advisories for Multiple Products

IoT
1 year ago

CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution

(I) IoT
6 years ago

Ubuntu Security Notice USN-6502-1

(I) IoT
11 months ago
Exit mobile version