The network appliances manufacturer giant Cisco published an advisory on 15 June 2022 in which Cisco detailed an authentication bypass vulnerability in Cisco ESA (Email Security Appliance) and Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA). The vulnerability tracked as CVE-2022-20798 is a Critical severity vulnerability with a CVSS score of 9.8 out of 10. The flaw is in the external authentication functionality of Cisco ESA and Cisco SMA that allows an unauthenticated, but unprivileged, remote attacker to bypass authentication and log in to the web management interface of an affected device. Since this flaw allows the attacker to bypass authentication and log in to the web management interface, it is most important to fix the CVE-2022-20798 vulnerability. Let’s see how to fix CVE-2022-20798, an authentication bypass vulnerability in Cisco ESA and Cisco SMA, in this post.
Cisco Email Security Appliance (ESA) is a powerful email security gateway that provides comprehensive protection against all types of email-based threats. ESA uses a multi-layered approach to email security that includes advanced malware protection, spam filtering, and data loss prevention (DLP). ESA also provides granular control over email content and attachments and the ability to create custom policies to meet specific business needs.
Cisco ESA is easy to deploy and manage, making it an ideal solution for businesses of all sizes. The appliance is scalable to support the changing needs of businesses and offers the flexibility to create custom policies to meet specific email security requirements. With Cisco ESA, organizations can confidently protect their email systems and data from the ever-growing threat of email-based attacks.
Key Features of Cisco ESA include:
Multi-layered email security protection.
Granular control over email content and attachments.
Flexible and scalable to support changing business needs.
Easy to deploy and manage.
For more information about Cisco ESA, please visit: https://www.cisco.com/c/en/us/products/security/email-security/index.html.
Cisco Secure Email and Web Manager is an on-premises email and web security gateway that helps organizations protect their email and web communications from malware, phishing, and other threats. The gateway includes a robust set of features to control inbound and outbound email traffic, filter web traffic, and block malicious content. Additionally, Cisco Secure Email and Web Manager provides granular user controls, extensive reporting capabilities, and integration with third-party anti-virus and anti-spam solutions.
Organizations can use Cisco Secure Email and Web Manager to protect their employees from malware, phishing attacks, and other online threats. The gateway’s filtering capabilities can block malicious content before it reaches users’ inboxes, while the web filtering feature can prevent users from accessing malicious websites. Additionally, the gateway provides granular user controls that allow administrators to specify which users have access to which email and web resources. Cisco Secure Email and Web Manager also includes comprehensive reporting capabilities, so organizations can track email and web traffic patterns and identify potential security threats.
Additionally, Cisco Secure Email and Web Manager integrates with leading anti-virus and anti-spam solutions to provide an additional layer of protection for email and web communications. The gateway can also be used in conjunction with Cisco’s secure web gateway solution, providing organizations with a complete solution for protecting their email and web traffic.
Cisco Secure Email and Web Manager is available as a virtual appliance or hardware appliance. It can be deployed as a standalone solution or integrated with an existing Cisco ASA firewall for added protection.
The solution provides a comprehensive set of features to secure email and web traffic, including:
Content filtering to block spam, phishing, and malware.
URL filtering to block malicious or inappropriate websites.
Email encryption to protect confidential information in transit.
Web encryption to protect data and transactions.
Authentication to ensure only authorized users can access email and web resources.
For more information about Cisco ESA, please visit: https://www.cisco.com/c/en/us/products/security/content-security-management-appliance/index.html#~features
This is an authentication bypass vulnerability in Cisco ESA (Email Security Appliance) and Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA). This flaw is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. This vulnerability could allow attackers to exploit this vulnerability by entering a specific input on the login page of the affected device. The flaw allows an authenticated, but unprivileged, remote attacker to bypass authentication and log in (unauthorized access) to the web management interface of an affected device.
Associated CVE ID | CVE-2022-20798 |
Description | An Authentication Bypass Vulnerability in Cisco ESA and Cisco SMA |
Associated ZDI ID | – |
CVSS Score | 9.8 Critical |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
Cisco advisory says that this Authentication Bypass Vulnerability affects both virtual and hardware appliances of Cisco ESA and Cisco SMA products that run a vulnerable version of Cisco AsyncOS Software with these conditions. Note: This vulnerability affects only the devices on which external authentication is enabled. However, since external authentication is disabled as per the default settings on the appliances, they are considered safe.
The devices are configured to use external authentication.
The devices use LDAP as an authentication protocol.
Cisco ESA 14. 13. 12. 11, and earlier versions are affected by CVE-2022-20798. And Cisco SMA 14.1, 14.0, 13.8, 13.6, 13.0, 12.8, 12, 11, and earlier versions are affected by CVE-2022-20798.
This vulnerability affects only the devices on which external authentication is enabled. You need to check that external authentication is enabled on your Cisco ESA and Cisco SMA devices. Let’s see how to check external authentication is enabled on your appliances.
Log in to the appliances
Log in to the web-based management interface of Cisco ESA or Cisco SMA.
Go to Users
Navigate to System Administration > Users
Check the External Authentication is enabled
If the Enable External Authentication check box is checked in green, external authentication is enabled.
Cisco has released security patches to fix the CVE-2022-20798 vulnerability. Please refer to these two tables to see the vulnerable versions of Cisco ESA and Cisco SMA with recommended fixes. We recommend upgrading to an appropriate fixed software release, as shown in the below tables.
Note: Cisco AsyncOS earlier than v11 are marked as end-of-life and kept out of support. Since v11 and earlier don’t get the support from the vendor, Cisco suggested they migrate to a supported version.
Cisco AsyncOS Release | First Fixed Release |
---|---|
111 and earlier | Migrate to fixed release. |
12 | Migrate to fixed release. |
12.8 | Migrate to fixed release. |
13.0 | 13.0.0-277 |
13.6 | 13.6.2-090 |
13.8 | 13.8.1-090 |
14.0 | 14.0.0-418 |
14.1 | 14.1.0-250 |
Cisco AsyncOS Release | First Fixed Release |
---|---|
Earlier than 111 | Migrate to fixed release. |
11 | Migrate to fixed release. |
12 | Migrate to fixed release. |
13 | Migrate to fixed release. |
14 | 14.0.1-033 |
Well, Cisco has a workaround for those who can’t fix the CVE-2022-20798 vulnerability immediately. The vendor suggested disabling the anonymous binds on the external authentication server in their note. That’s it for now.
We hope this post helps you know how to fix CVE-2022-20798, an authentication bypass vulnerability in Cisco ESA and Cisco SMA. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-20650- The New RCE Vulnerability In Cisco Switches?
How To Fix CVE-2022-20857- An Arbitrary Command Execution Vulnerability In Cisco Nexus Dashboard
How To Fix CVE-2022-20714- A Denial Of Service In ASR 9000 Series Routers
How to Fix CVE-2023-20238- An Authentication Bypass Vulnerability in Cisco BroadWorks?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.