CVE-2015-0605
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
07/02/2015
Last modified:
12/04/2025
Description
The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:* | 8.5 (including) | |
| cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/62829
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37384
- http://www.securityfocus.com/bid/72528
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100695
- http://secunia.com/advisories/62829
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37384
- http://www.securityfocus.com/bid/72528
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100695



