Cisco has released security updates to contain three vulnerabilities affecting its products, including one high-severity flaw in its Email Security Appliance (ESA) that could result in a denial-of-service (DoS) condition on an affected device.
The weakness, assigned the identifier CVE-2022-20653 (CVSS score: 7. 5), stems from a case of insufficient error handling in DNS name resolution that could be abused by an unauthenticated, remote attacker to send a specially crafted email message and cause a DoS.
“A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition,” the company said in an advisory. “Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition. “
The flaw impacts Cisco ESA devices running Cisco AsyncOS Software running versions 14.0, 13. 5, 13.0, 12. 5 and earlier and have the “DANE feature enabled and with the downstream mail servers configured to send bounce messages.” DANE is short for DNS-based Authentication of Named Entities, which is used for outbound mail validation.
Cisco credited researchers from ICT service provider Rijksoverheid Dienst ICT Uitvoering (DICTU) for reporting the vulnerability, while pointing out that it’s not found any evidence of malicious exploitation.
Apart from the above, the manufacturer of networking equipment also fixed two flaws in Prime Infrastructure and Evolution Programmable Network Manager and Redundancy Configuration manager that could allow an adversary execute arbitrary codes and create a DoS situation –
- CVE-2022-20659 (CVSS score: 6. 1) – Cisco Prime Infrastructure and Evolved Programmable Network Manager cross-site scripting (XSS) vulnerability
- CVE-2022-20750 (CVSS score: 5. 3) – Cisco Redundancy Configuration Manager for Cisco StarOS Software TCP denial-of-service (DoS) vulnerability
The fixes also come weeks after Cisco published patches for multiple critical security vulnerabilities impacting its RV Series routers , some of which earned the highest possible CVSS severity score ratings of 10, that could be weaponized to elevate privileges and execute arbitrary code on affected systems.