CVE-2021-1534 (CNNVD-202110-299)
中文标题:
Cisco AsyncOS for Cisco Email Security Appliance 输入验证错误漏洞
英文标题:
Cisco Email Security Appliance URL Filtering Bypass Vulnerability
漏洞描述
中文描述:
Cisco Email Security Appliance(ESA)和Cisco AsyncOS都是美国思科(Cisco)公司的产品。Cisco Email Security Appliance是一个电子邮件安全设备。Cisco AsyncOS是一款应用于思科设备的操作系统。 Cisco ESA存在输入验证错误漏洞,该漏洞源于思科电子邮件安全设备(ESA)的AsyncOS软件反垃圾邮件保护机制对于url处理不当造成的。攻击者可以通过以特定方式创建URL来利用这个漏洞。成功的攻击可以让攻击者绕过为受影响设备配置的URL信誉过滤器,从而允许恶意URL通过设备。
英文描述:
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Email Security Appliance (ESA) | n/a | - | - |
cpe:2.3:a:cisco:cisco_email_security_appliance_(esa):n_a:*:*:*:*:*:*:*
|
| cisco | asyncos | * | - | - |
cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1534 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1534 |
2025-11-11 14:57:43 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202110-299 |
2025-11-11 15:10:44 | 2025-11-11 07:56:58 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-202110-299
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']