Cisco Content Security Management Appliance (SMA) 13.6.1-193

CPE Details

Cisco Content Security Management Appliance (SMA) 13.6.1-193
13.6.1-193
2020-09-11
10h02 +00:00
2020-09-11
10h02 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cisco:content_security_management_appliance:13.6.1-193:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

content_security_management_appliance

Version

13.6.1-193

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-1447 2021-05-06 12h40 +00:00 A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.
6.7
Moyen
CVE-2020-3447 2020-08-17 18h00 +00:00 A vulnerability in the CLI of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to excessive verbosity in certain log subscriptions. An attacker could exploit this vulnerability by accessing specific log files on an affected device. A successful exploit could allow the attacker to obtain sensitive log data, which may include user credentials. To exploit this vulnerability, the attacker would need to have valid credentials at the operator level or higher on the affected device.
6.5
Moyen