A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-esa-auth-bypass-66kEcxQD - Vendor Advisory |
Information
Published : 2022-06-15 18:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20798
Mitre link : CVE-2022-20798
CVE.ORG link : CVE-2022-20798
JSON object : View
Products Affected
cisco
- email_security_appliance
- secure_email_and_web_manager
CWE
CWE-287
Improper Authentication