A vulnerability has been reported in Cisco AsyncOS Software which could allow a remote attacker to execute arbitrary code on targeted system.
Target Audience:
IT administrators, Enterprise Security Teams, SOC/IR Teams, and organizations using Cisco Secure Email Gateway or Secure Email and Web Manager appliances.
Risk Assessment:
Critical risk of data manipulation and service disruption.
Impact Assessment:
Confidentiality, Integrity and Availability of System.
Cisco has indicated that no complete workaround or patch is currently available. As interim risk reduction measures, organizations are advised to:
- Restrict or disable external access to the web management interface
- Disable or restrict access to the Spam Quarantine service if not required
- Disable HTTP access to administrative interfaces where feasible
- Monitor web and system logs for unusual activity, including unauthorized HTTP POST requests
- If compromise is suspected, isolate and rebuild the affected appliance from a trusted source
Apply vendor-provided updates immediately once released.
The information provided herein is on "as is" basis, without warranty of any kind.