CVE-2020-26082

A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device. The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 5.8
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg - Vendor Advisory () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg - Vendor Advisory

09 Aug 2023, 20:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Cisco email Security Appliance C690
Cisco email Security Appliance C690x
Cisco email Security Appliance C390
Cisco email Security Appliance C170
Cisco email Security Appliance C190
Cisco email Security Appliance C380
Cisco
Cisco asyncos
Cisco email Security Appliance C680
CPE cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*
References (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg - (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg - Vendor Advisory
CWE NVD-CWE-noinfo

04 Aug 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-04 21:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26082

Mitre link : CVE-2020-26082

CVE.ORG link : CVE-2020-26082


JSON object : View

Products Affected

cisco

  • email_security_appliance_c190
  • asyncos
  • email_security_appliance_c680
  • email_security_appliance_c690
  • email_security_appliance_c170
  • email_security_appliance_c390
  • email_security_appliance_c380
  • email_security_appliance_c690x
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo