PT-2020-3857 · Cisco · Cisco Email Security Appliance

Published

2020-09-03

·

Updated

2024-11-18

·

CVE-2020-3548

CVSS v3.1
7.5
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions: Cisco Email Security Appliance (ESA) versions (affected versions not specified)
Description: A vulnerability in the Transport Layer Security (TLS) protocol implementation could allow an unauthenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The issue is due to inefficient processing of incoming TLS traffic. An attacker could exploit this by sending crafted TLS packets to an affected device, potentially triggering a prolonged state of high CPU utilization and degrading response time and overall performance.
Recommendations: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Weakness Enumeration

Related Identifiers

BDU:2020-04219
CVE-2020-3548

Affected Products

Cisco Email Security Appliance