ID

VAR-201901-0592


CVE

CVE-2018-15460


TITLE

Cisco Email Security Appliances Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-001924

DESCRIPTION

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages. CiscoEmailSecurityAppliance (ESA) is an email security appliance from Cisco. AsyncOSSoftware is the operating system used in it. This issue is being tracked by Cisco Bug ID CSCvm81627

Trust: 2.61

sources: NVD: CVE-2018-15460 // JVNDB: JVNDB-2019-001924 // CNVD: CNVD-2019-01872 // BID: 106507 // VULHUB: VHN-125722 // VULMON: CVE-2018-15460

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-01872

AFFECTED PRODUCTS

vendor:ciscomodel:asyncosscope:ltversion:11.0.2-044_md

Trust: 1.0

vendor:ciscomodel:asyncosscope:gteversion:11.1.0

Trust: 1.0

vendor:ciscomodel:asyncosscope:ltversion:11.1.2-023_md

Trust: 1.0

vendor:ciscomodel:e email security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:email security appliance nonescope: - version: -

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:11.1.0-135

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:11.0.2-037

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:11.0.0-274

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:10.0.3-004

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:12.0.0-281

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.1.2-023

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.0.2-044

Trust: 0.3

sources: CNVD: CNVD-2019-01872 // BID: 106507 // JVNDB: JVNDB-2019-001924 // NVD: CVE-2018-15460

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15460
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15460
value: HIGH

Trust: 1.0

NVD: CVE-2018-15460
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-01872
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201901-291
value: HIGH

Trust: 0.6

VULHUB: VHN-125722
value: HIGH

Trust: 0.1

VULMON: CVE-2018-15460
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15460
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-01872
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-125722
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2018-15460
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2018-15460
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2019-01872 // VULHUB: VHN-125722 // VULMON: CVE-2018-15460 // JVNDB: JVNDB-2019-001924 // CNNVD: CNNVD-201901-291 // NVD: CVE-2018-15460 // NVD: CVE-2018-15460

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-770

Trust: 1.1

sources: VULHUB: VHN-125722 // JVNDB: JVNDB-2019-001924 // NVD: CVE-2018-15460

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-291

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201901-291

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001924

PATCH

title:cisco-sa-20190109-esa-url-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos

Trust: 0.8

title:Cisco Email Security Appliance AsyncOS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88492

Trust: 0.6

title:Cisco: Cisco Email Security Appliance URL Filtering Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190109-esa-url-dos

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-patches-critical-default-password-bug/142814/

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-critical-vulnerability-patch/140726/

Trust: 0.1

sources: VULMON: CVE-2018-15460 // JVNDB: JVNDB-2019-001924 // CNNVD: CNNVD-201901-291

EXTERNAL IDS

db:NVDid:CVE-2018-15460

Trust: 3.5

db:BIDid:106507

Trust: 2.7

db:JVNDBid:JVNDB-2019-001924

Trust: 0.8

db:CNNVDid:CNNVD-201901-291

Trust: 0.7

db:CNVDid:CNVD-2019-01872

Trust: 0.6

db:VULHUBid:VHN-125722

Trust: 0.1

db:VULMONid:CVE-2018-15460

Trust: 0.1

sources: CNVD: CNVD-2019-01872 // VULHUB: VHN-125722 // VULMON: CVE-2018-15460 // BID: 106507 // JVNDB: JVNDB-2019-001924 // CNNVD: CNNVD-201901-291 // NVD: CVE-2018-15460

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-url-dos

Trust: 2.8

url:http://www.securityfocus.com/bid/106507

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-15460

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15460

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/770.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-critical-vulnerability-patch/140726/

Trust: 0.1

sources: CNVD: CNVD-2019-01872 // VULHUB: VHN-125722 // VULMON: CVE-2018-15460 // BID: 106507 // JVNDB: JVNDB-2019-001924 // CNNVD: CNNVD-201901-291 // NVD: CVE-2018-15460

CREDITS

This vulnerability was found during the resolution of a Cisco TAC support case.

Trust: 0.6

sources: CNNVD: CNNVD-201901-291

SOURCES

db:CNVDid:CNVD-2019-01872
db:VULHUBid:VHN-125722
db:VULMONid:CVE-2018-15460
db:BIDid:106507
db:JVNDBid:JVNDB-2019-001924
db:CNNVDid:CNNVD-201901-291
db:NVDid:CVE-2018-15460

LAST UPDATE DATE

2024-11-23T22:12:10.940000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-01872date:2019-01-17T00:00:00
db:VULHUBid:VHN-125722date:2020-09-16T00:00:00
db:VULMONid:CVE-2018-15460date:2020-09-16T00:00:00
db:BIDid:106507date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2019-001924date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-291date:2020-09-17T00:00:00
db:NVDid:CVE-2018-15460date:2024-11-21T03:50:51.233

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-01872date:2019-01-17T00:00:00
db:VULHUBid:VHN-125722date:2019-01-10T00:00:00
db:VULMONid:CVE-2018-15460date:2019-01-10T00:00:00
db:BIDid:106507date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2019-001924date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-291date:2019-01-10T00:00:00
db:NVDid:CVE-2018-15460date:2019-01-10T22:29:00.237