A vulnerability in the MP3 detection engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper validation of certain MP3 file types. An attacker could exploit this vulnerability by sending a crafted MP3 file through the targeted device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-11-26T03:42:32.149857Z

Updated: 2024-11-19T18:51:12.931Z

Reserved: 2019-09-06T00:00:00

Link: CVE-2019-15971

cve-icon Vulnrichment

Updated: 2024-08-05T01:03:32.407Z

cve-icon NVD

Status : Analyzed

Published: 2019-11-26T04:15:11.653

Modified: 2020-10-16T13:31:23.680

Link: CVE-2019-15971

cve-icon Redhat

No data.