mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
151 lines
6.5 KiB
JSON
151 lines
6.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-20153",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device. \r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper Access Control",
|
|
"cweId": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Secure Email",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14.0.0-698"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13.5.1-277"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13.0.0-392"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14.2.0-620"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13.0.5-007"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13.5.4-038"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14.2.1-020"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14.3.0-032"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0.0-104"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0.1-030"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.5.0-048"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.5.1-055"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.5.2-018"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "16.0.0-050"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0.3-002"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-mailpol-bypass-5nVcJZMw",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-mailpol-bypass-5nVcJZMw"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-esa-mailpol-bypass-5nVcJZMw",
|
|
"discovery": "INTERNAL",
|
|
"defects": [
|
|
"CSCwm82380"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
|
"baseScore": 5.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
}
|
|
]
|
|
}
|
|
} |