A vulnerability in the Transport Layer Security (TLS) protocol implementation of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition.
The vulnerability is due to inefficient processing of incoming TLS traffic. An attacker could exploit this vulnerability by sending a series of crafted TLS packets to an affected device. A successful exploit could allow the attacker to trigger a prolonged state of high CPU utilization. The affected device would still be operative, but response time and overall performance may be degraded.There are no workarounds that address this vulnerability.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb | Vendor Advisory |
Configurations
History
31 Jul 2025, 17:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:* | |
First Time |
Cisco
Cisco email Security Appliance |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb - Vendor Advisory |
18 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-18 16:15
Updated : 2025-07-31 17:17
NVD link : CVE-2020-3548
Mitre link : CVE-2020-3548
CVE.ORG link : CVE-2020-3548
JSON object : View
Products Affected
cisco
- email_security_appliance
CWE
CWE-407
Inefficient Algorithmic Complexity