Severity
7.2HIGH
EPSS
0.2%
top 53.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 1

Description

A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]]. The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could e

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 1.2 | Impact: 5.2

Affected Packages4 packages

NVDcisco/secure_email_and_web_manager13.8.013.8.1-108+3
CVEListV5cisco/cisco_secure_email13 versions+12
NVDcisco/email_security_appliance13.0.013.0.5-007+4

🔴Vulnerability Details

2
GHSA
GHSA-rj99-fcj2-r7fw: A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow2023-03-01
CVEList
CVE-2023-20009: A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow2023-02-16

📋Vendor Advisories

1
Cisco
Cisco Email Security Appliance and Cisco Secure Email and Web Manager Vulnerabilities2023-02-15
CVE-2023-20009 (HIGH CVSS 7.2) | A vulnerability in the Web UI and a | cvebase.io