CVE-2022-20664 An attack in the web interface of Cisco SMA and ESA could allow a remote attacker to retrieve sensitive information.

CVE-2022-20664 An attack in the web interface of Cisco SMA and ESA could allow a remote attacker to retrieve sensitive information.

The following is the LDAP query input that could be used to exploit this vulnerability: The following is the LDAP query input that could be used to exploit this vulnerability: UserDN:cn=ldap,ou=users,dc=example,dc=com mail:*
In the above example, replace cn=ldap,ou=users,dc=example,dc=com with the correct DN of the LDAP server. Cisco has released software updates that address these vulnerabilities in the following products: Cisco Secure Email and Web Manager :
Cisco Email Security Appliance : There are no workarounds available to mitigate this vulnerability. INDICATORS If you have enabled LDAP on your Cisco product with an external authentication server, and the information in the following tables matches your environment, then you are vulnerable to this attack. - LDAP query input - LDAP server - Cisco product - Cisco version

LDAP Query Input

In the following LDAP query input, replace cn=ldap,ou=users,dc=example,dc=com with the correct DN of the LDAP server.

LDAP Query Input that Could Be Used to Exploit the Vulnerability

The following is the LDAP query input that could be used to exploit this vulnerability: UserDN:cn=ldap,ou=users,dc=example,dc=com mail:*
In the above example, replace cn=ldap,ou=users,dc=example,dc=com with the correct DN of the LDAP server. Cisco has released software updates that address these vulnerabilities in the following products: Cisco Secure Email and Web Manager :
Cisco Email Security Appliance : There are no workarounds available to mitigate this vulnerability. INDICATORS If you have enabled LDAP on your Cisco product with an external authentication server, and the information in the following tables matches your environment, then you are vulnerable to this attack. - LDAP query input - LDAP server - Cisco product - Cisco version
-2+ user credentials-

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe