{"id":165905,"date":"2024-07-19T08:34:52","date_gmt":"2024-07-19T08:34:52","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165905"},"modified":"2024-07-19T08:34:54","modified_gmt":"2024-07-19T08:34:54","slug":"cisco-fixed-a-critical-flaw-in-security-email-gateway-that-could-allow-attackers-to-add-root-users","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165905\/security\/cisco-fixed-a-critical-flaw-in-security-email-gateway-that-could-allow-attackers-to-add-root-users.html","title":{"rendered":"Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users"},"content":{"rendered":"
<\/div>\n

Cisco has addressed a critical vulnerability that could allow attackers to add new root users to Security Email Gateway (SEG) appliances.<\/gwmw><\/gwmw><\/h2>\n\n\n\n

Cisco fixed a critical vulnerability, tracked as CVE-2024-20401 (CVSS score 9.8), that could allow unauthenticated, remote attackers to add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances.<\/p>\n\n\n\n

The flaw resides in the content scanning and message filtering features of Cisco Secure Email Gateway.<\/p>\n\n\n\n

The vulnerability arises from improper handling of email attachments when file analysis and content filters are enabled. Attackers could exploit this by sending a specially crafted email attachment, allowing them to replace any file on the file system. This could enable them to add root users, modify configurations, execute arbitrary code, or trigger a permanent denial of service (DoS) condition on the affected device.<\/gwmw><\/p>\n\n\n\n

“A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.” reads the advisory<\/a> published by Cisco.<\/em><\/p>\n\n\n\n

“This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with\u00a0root\u00a0privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.”<\/em><\/p>\n\n\n\n

The flaw impacts Cisco Secure Email Gateway running a vulnerable release of Cisco AsyncOS if either the file analysis feature (part of Cisco Advanced Malware Protection) or the content filter feature is enabled and assigned to an incoming mail policy, and if the Content Scanner Tools version is earlier than 23.3.0.4823.<\/p>\n\n\n\n

Content Scanner Tools version 23.3.0.4823 and later address this vulnerability. This updated version is also part of Cisco AsyncOS for Cisco Secure Email Software releases 15.5.1-055 and later.<\/p>\n\n\n\n

Users could determine whether file analysis is enabled by connecting to the product web management interface (“Mail Policies > Incoming Mail Policies > Advanced Malware Protection > Mail Policy”) and checking if “Enable File Analysis” option is checked.<\/p>\n\n\n\n

To determine whether content filters are enabled, users can open the product web interface and check if the “Content Filters” column (“Choose Mail Policies > Incoming Mail Policies > Content Filters”) doesn’t contain the value “disabled.”<\/p>\n\n\n\n

The company’s Product Security Incident Response Team (PSIRT) is not aware of exploitation attempts targeting the CVE-2024-20401 vulnerability in the wild.<\/p>\n\n\n\n

This week, the IT giant has addressed<\/a> a critical vulnerability, tracked as CVE-2024-20419 (CVSS score of 10.0), in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers that allow attackers to change any user\u2019s password.<\/p>\n\n\n\n

The issue is due to an improper implementation in the password-change process. Threat actors can trigger the vulnerability by sending specially crafted HTTP requests to vulnerable devices.<\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0Cisco)<\/strong><\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Cisco has addressed a critical vulnerability that could allow attackers to add new root users to Security Email Gateway (SEG) appliances. Cisco fixed a critical vulnerability, tracked as CVE-2024-20401 (CVSS score 9.8), that could allow unauthenticated, remote attackers to add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances. The flaw […]<\/p>\n","protected":false},"author":1,"featured_media":26713,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,55],"tags":[1671,15232,4112,9508,9506,10918,687,841,1533],"class_list":["post-165905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-security","tag-cisco","tag-cisco-security-email-gateway","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司