A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.
History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-10-02T19:06:50.592526Z

Updated: 2024-11-19T18:53:34.014Z

Reserved: 2019-06-04T00:00:00

Link: CVE-2019-12706

cve-icon Vulnrichment

Updated: 2024-08-04T23:24:39.259Z

cve-icon NVD

Status : Modified

Published: 2019-10-02T19:15:13.967

Modified: 2024-11-21T04:23:24.300

Link: CVE-2019-12706

cve-icon Redhat

No data.