Cisco Patches Critical Vulnerabilities in Secure Email Gateway, SSM

Cisco Patches Critical Vulnerabilities in Secure Email Gateway, SSM

July 18, 2024 at 07:45AM

Cisco announced software updates for around a dozen vulnerabilities, which included critical-severity bugs in Secure Email Gateway and Smart Software Manager On-Prem. The flaws could allow an attacker to execute arbitrary code, initiate denial-of-service conditions, or access the web UI with compromised user privileges. Cisco also addressed high-severity vulnerabilities in various other products.

Based on the meeting notes, the key takeaways are:

1. Cisco has announced software updates for around a dozen vulnerabilities, including two critical-severity bugs in Secure Email Gateway and Smart Software Manager On-Prem.

2. The Secure Email Gateway flaw (CVE-2024-20401) with a CVSS score of 9.8, involves improper handling of email attachments, potentially allowing an attacker to perform various actions on the affected device.

3. Secure Email Gateway appliances are affected if they are running a vulnerable version of AsyncOS, have the file analysis or content filter feature enabled, and use a Content Scanner Tools version prior to 23.3.0.4823. The fix is included in AsyncOS for Secure Email Software releases 15.5.1-055 and later.

4. Cisco has also announced patches for CVE-2024-20419, a critical flaw in the authentication system of Smart Software Manager On-Prem (SSM On-Prem), which could allow a remote, unauthenticated attacker to change a user’s password.

5. BlastRADIUS vulnerability impacts multiple Cisco products, and the company is still investigating over 40 products to determine if they are impacted.

6. Cisco has resolved high-severity vulnerabilities in the CLI of various software that could lead to command execution, privilege escalation, information disclosure, and a DoS condition.

7. While Cisco is not aware of these vulnerabilities being exploited in attacks, proof-of-concept (PoC) code targeting BlastRADIUS does exist.

For additional information and specific details, individuals are encouraged to refer to Cisco’s security advisories page.

Full Article