CVE-2018-0447 (CNNVD-201809-280)
中文标题:
Cisco Email Security Appliance AsyncOS Software 访问控制错误漏洞
英文标题:
Cisco Email Security Appliance URL Filtering Bypass Vulnerability
漏洞描述
中文描述:
Cisco Email Security Appliance(ESA)是美国思科(Cisco)公司的一套电子邮件安全设备。该设备提供垃圾邮件保护、邮件加密、数据丢失防护等功能。AsyncOS Software是一套使用在其中的操作系统。 Cisco ESA的AsyncOS Software中的反垃圾邮件保护机制存在访问控制错误漏洞,该漏洞源于不完整的输入验证检测机制(用于检测Sender Policy Framework消息)。远程攻击者可通过发送自定义的SPF数据包利用该漏洞绕过设备所配置的URL过滤器。
英文描述:
A vulnerability in the anti-spam protection mechanisms of Cisco AsyncOS Software for the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass certain content filters on an affected device. The vulnerability is due to incomplete input and validation checking mechanisms for certain Sender Policy Framework (SPF) messages that are sent to an affected device. An attacker could exploit this vulnerability by sending a customized SPF packet to an affected device. If successful, an exploit could allow the attacker to bypass the URL filters that are configured for the affected device, which could allow malicious URLs to pass through the device.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Email Security Appliance (ESA) | n/a | - | - |
cpe:2.3:a:cisco:cisco_email_security_appliance_(esa):n_a:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | - | - | - |
cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-0447 |
2025-11-11 15:19:35 | 2025-11-11 07:34:57 |
| NVD | nvd_CVE-2018-0447 |
2025-11-11 14:55:59 | 2025-11-11 07:43:33 |
| CNNVD | cnnvd_CNNVD-201809-280 |
2025-11-11 15:10:05 | 2025-11-11 07:53:56 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-201809-280
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.3
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']