{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:17:59.813","vulnerabilities":[{"cve":{"id":"CVE-2021-1534","sourceIdentifier":"psirt@cisco.com","published":"2021-10-06T20:15:07.657","lastModified":"2024-11-21T05:44:34.010","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device."},{"lang":"es","value":"Una vulnerabilidad en los mecanismos de protección antispam del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podría permitir a un atacante remoto no autenticado omitir los filtros de reputación de URL en un dispositivo afectado. Esta vulnerabilidad es debido al procesamiento inapropiado de las URL. Un atacante podría explotar esta vulnerabilidad al diseñar una URL de una manera particular. Una explotación con éxito podría permitir al atacante omitir los filtros de reputación de URL que están configurados para un dispositivo afectado, lo que podría permitir el paso de URLs maliciosas mediante el dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0.1","matchCriteriaId":"6F97C8DE-48FA-4609-BF07-8E6AD4C34322"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*","matchCriteriaId":"0E5FD72D-E9E6-451C-9483-EBFDD41C9336"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*","matchCriteriaId":"A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*","matchCriteriaId":"CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*","matchCriteriaId":"675068B9-167C-42F9-87DD-FF0146B8ADDC"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*","matchCriteriaId":"1A2334C4-812A-4C28-B708-EA969C05D4C1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*","matchCriteriaId":"4BA67042-D6DD-436D-9E41-475CBD670940"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*","matchCriteriaId":"57AFD49E-F367-4776-85B8-6BD7F57D78C9"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}