CVE-2023-31488

Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document.
References
Link Resource
https://bst.cisco.com/quickview/bug/CSCwe11003 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:ironport_email_security_appliance:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:secure_email_gateway_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*

History

19 Jan 2024, 17:50

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://bst.cisco.com/quickview/bug/CSCwe11003 - () https://bst.cisco.com/quickview/bug/CSCwe11003 - Vendor Advisory
First Time Cisco secure Email Gateway Firmware
Cisco secure Email Gateway
Cisco
Cisco ironport Email Security Appliance
CPE cpe:2.3:o:cisco:secure_email_gateway_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ironport_email_security_appliance:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_gateway:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

11 Jan 2024, 13:57

Type Values Removed Values Added
Summary
  • (es) Las versiones de Hyland Perceived Filters anteriores al 8 de diciembre de 2023 (por ejemplo, 11.4.0.2647), tal como se utilizan en el software Cisco IronPort Email Security Appliance, Cisco Secure Email Gateway y varios productos que no son de Cisco, permiten a los atacantes desencadenar un fallo de segmentación y ejecutar código arbitrario a través de un documento manipulado.

10 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-10 20:15

Updated : 2024-01-19 17:50


NVD link : CVE-2023-31488

Mitre link : CVE-2023-31488

CVE.ORG link : CVE-2023-31488


JSON object : View

Products Affected

cisco

  • secure_email_gateway_firmware
  • secure_email_gateway
  • ironport_email_security_appliance