A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass content filters that are configured on an affected device. The vulnerability is due to improper handling of password-protected zip files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted zip-compressed file to an affected device. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
History

Wed, 09 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2023-08-04T20:49:05.202Z

Updated: 2025-07-09T13:37:52.867Z

Reserved: 2020-09-24T00:00:00.000Z

Link: CVE-2020-26082

cve-icon Vulnrichment

Updated: 2024-08-04T15:49:06.980Z

cve-icon NVD

Status : Modified

Published: 2023-08-04T21:15:10.787

Modified: 2024-11-21T05:19:12.007

Link: CVE-2020-26082

cve-icon Redhat

No data.