CVE-2021-1566Improper Following of a Certificate's Chain of Trust in Cisco Asyncos

Severity
7.4HIGHNVD
EPSS
0.1%
top 67.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 16
Latest updateMay 24

Description

A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2

Affected Packages2 packages

NVDcisco/asyncos13.013.0.0-030+5

🔴Vulnerability Details

2
GHSA
GHSA-9pg8-7479-p4jw: A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and2022-05-24
CVEList
Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability2021-06-16

📋Vendor Advisories

1
Cisco
Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability2021-06-16
CVE-2021-1566 — Cisco Asyncos vulnerability | cvebase