Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-3548


A vulnerability in the Transport Layer Security (TLS) protocol implementation of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient processing of incoming TLS traffic. An attacker could exploit this vulnerability by sending a series of crafted TLS packets to an affected device. A successful exploit could allow the attacker to trigger a prolonged state of high CPU utilization. The affected device would still be operative, but response time and overall performance may be degraded.There are no workarounds that address this vulnerability.


Published

2024-11-18T16:15:08.100

Last Modified

2025-07-31T17:17:22.500

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-407

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco email_security_appliance ≤ 13.5.1-277 Yes

References