ID

VAR-201911-1323


CVE

CVE-2019-15988


TITLE

Cisco Email Security Appliance Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-012826

DESCRIPTION

A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. Cisco Email Security Appliance (ESA) Contains an input validation vulnerability.Information may be tampered with. AsyncOS Software is a set of operating systems running on it

Trust: 1.71

sources: NVD: CVE-2019-15988 // JVNDB: JVNDB-2019-012826 // VULHUB: VHN-148089

AFFECTED PRODUCTS

vendor:ciscomodel:email security appliancescope:lteversion:12.5.0

Trust: 1.0

vendor:ciscomodel:e email security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:email security appliancescope:eqversion:7.3.0

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.3

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:3.3.1-09

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.1

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.3

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.2

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.0

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.4

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion: -

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.1.5

Trust: 0.6

sources: JVNDB: JVNDB-2019-012826 // CNNVD: CNNVD-201911-1203 // NVD: CVE-2019-15988

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15988
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15988
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-15988
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201911-1203
value: MEDIUM

Trust: 0.6

VULHUB: VHN-148089
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-15988
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148089
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-15988
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15988
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: CVE-2019-15988
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-148089 // JVNDB: JVNDB-2019-012826 // CNNVD: CNNVD-201911-1203 // NVD: CVE-2019-15988 // NVD: CVE-2019-15988

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-148089 // JVNDB: JVNDB-2019-012826 // NVD: CVE-2019-15988

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-1203

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201911-1203

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-012826

PATCH

title:cisco-sa-20191120-esa-url-bypassurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-esa-url-bypass

Trust: 0.8

sources: JVNDB: JVNDB-2019-012826

EXTERNAL IDS

db:NVDid:CVE-2019-15988

Trust: 2.5

db:JVNDBid:JVNDB-2019-012826

Trust: 0.8

db:CNNVDid:CNNVD-201911-1203

Trust: 0.7

db:AUSCERTid:ESB-2019.4393

Trust: 0.6

db:VULHUBid:VHN-148089

Trust: 0.1

sources: VULHUB: VHN-148089 // JVNDB: JVNDB-2019-012826 // CNNVD: CNNVD-201911-1203 // NVD: CVE-2019-15988

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191120-esa-url-bypass

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-15988

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15988

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191120-esa-mp3-bypass

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4393/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-email-security-appliance-privilege-escalation-via-url-filtering-bypass-30927

Trust: 0.6

sources: VULHUB: VHN-148089 // JVNDB: JVNDB-2019-012826 // CNNVD: CNNVD-201911-1203 // NVD: CVE-2019-15988

SOURCES

db:VULHUBid:VHN-148089
db:JVNDBid:JVNDB-2019-012826
db:CNNVDid:CNNVD-201911-1203
db:NVDid:CVE-2019-15988

LAST UPDATE DATE

2024-11-23T22:16:46.383000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148089date:2019-12-11T00:00:00
db:JVNDBid:JVNDB-2019-012826date:2019-12-13T00:00:00
db:CNNVDid:CNNVD-201911-1203date:2019-12-12T00:00:00
db:NVDid:CVE-2019-15988date:2024-11-21T04:29:52.810

SOURCES RELEASE DATE

db:VULHUBid:VHN-148089date:2019-11-26T00:00:00
db:JVNDBid:JVNDB-2019-012826date:2019-12-13T00:00:00
db:CNNVDid:CNNVD-201911-1203date:2019-11-20T00:00:00
db:NVDid:CVE-2019-15988date:2019-11-26T04:15:11.983