{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T08:28:07.794","vulnerabilities":[{"cve":{"id":"CVE-2023-20057","sourceIdentifier":"psirt@cisco.com","published":"2023-01-20T07:15:17.377","lastModified":"2024-11-21T07:40:27.190","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.\r\n\r This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device."},{"lang":"es","value":"Una vulnerabilidad en el mecanismo de filtrado de URL del software Cisco AsyncOS para Cisco Email Security Appliance (ESA) podría permitir que un atacante remoto no autenticado evite los filtros de reputación de URL en un dispositivo afectado. Esta vulnerabilidad se debe a un procesamiento inadecuado de las URL. Un atacante podría aprovechar esta vulnerabilidad creando una URL de una manera particular. Un exploit exitoso podría permitir al atacante eludir los filtros de reputación de URL configurados para un dispositivo afectado, lo que podría permitir que URL maliciosas pasen a través del dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N","baseScore":0.0,"baseSeverity":"NONE","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":0.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-792"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*","matchCriteriaId":"87AA6AB8-12B9-4810-9D06-01EEBF7B01C9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c160:-:*:*:*:*:*:*:*","matchCriteriaId":"50009089-506D-42B4-B34D-CFC719B0395B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*","matchCriteriaId":"0E5FD72D-E9E6-451C-9483-EBFDD41C9336"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*","matchCriteriaId":"A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c370:-:*:*:*:*:*:*:*","matchCriteriaId":"B8ED62C8-2B7E-47CA-BE16-00E02CA72763"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c370d:-:*:*:*:*:*:*:*","matchCriteriaId":"93AF10FC-7988-446F-86E6-8A4E90762DA0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*","matchCriteriaId":"CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*","matchCriteriaId":"675068B9-167C-42F9-87DD-FF0146B8ADDC"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c670:-:*:*:*:*:*:*:*","matchCriteriaId":"A1149EA5-37D0-4E1F-803D-A7A0658653FE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*","matchCriteriaId":"1A2334C4-812A-4C28-B708-EA969C05D4C1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*","matchCriteriaId":"4BA67042-D6DD-436D-9E41-475CBD670940"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*","matchCriteriaId":"57AFD49E-F367-4776-85B8-6BD7F57D78C9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:email_security_appliance_x1070:-:*:*:*:*:*:*:*","matchCriteriaId":"E312DF25-A961-4682-B374-4A394431F8E3"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}