IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Cisco patches bug that could break its email security service with a single message

A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages

A Cisco sign on a street corner next to a red traffic light

Cisco has fixed a bug that could allow attackers to lock up its email security appliance with a single malicious email.

The bug, which has the ID CVE-2022-20653, affects Cisco's Email Security Appliance (ESA), an email security gateway product that detects and blocks email-borne malware, spam, and phishing attempts.

The problem lies in the ASyncOS operating system that the ESA uses, according to an advisory issued by the company this week.

The problem lies in the appliance's use of DNS-based Authentication of Named Entities (DANE) for security. DANE uses the more secure DNSSEC protocol to provide extra verification that a DNS record is legitimate. This makes it harder for malicious actors to spoof digital certificates or use man-in-the-middle attacks to misdirect DNS requests.

However, Cisco found that ASyncOS was unable to properly handle DNS name resolution, opening it up to exploit through malicious inputs.

In this case, the malicious input would be an email and, if crafted correctly, could freeze the appliance's management interface and stop it processing further emails until it had recovered.

Cisco has classified the vulnerability, which has a CVSS score of 7.5, as a denial of service (DoS) bug.

"Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition," Cisco warned.

Related Resource

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Man at his computer next to title card - whitepaper from ServiceNowFree download

The DANE feature is not enabled by default, meaning that only those who have activated it will be affected. Those customers can install Cisco's software updates to fix the problem.

In the meantime, customers can also configure bounce messages from the ESA instead of from downstream dependent email servers to stop attackers exploiting the bug, the company said.

The ASyncOS software saw two other reported vulnerabilities last year. CVE-2021-1566 was a bug in its Cisco Advanced Malware protection for Endpoints integration, allowing the interception of remote traffic. The other, CVE-2021-1359, allowed attackers to gain root privileges.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Cisco patches critical bugs in collaboration products
vulnerability

Cisco patches critical bugs in collaboration products

3 Mar 2022
Cisco launches suite of products aimed at improving enterprise campus networks
Network & Internet

Cisco launches suite of products aimed at improving enterprise campus networks

3 Feb 2022
The IT Pro Podcast: Can 5G close the digital divide?
5G

The IT Pro Podcast: Can 5G close the digital divide?

6 Aug 2021
Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022
Preparing for the 3G sunset
Network & Internet

Preparing for the 3G sunset

18 May 2022