This page was not yet optimized for use on mobile devices.
CVE-2020-3132
Data ?
Vulnerability ID | CVE-2020-3132 |
---|---|
Published on | 19.02.2020 20:15 |
Severity | MEDIUM |
Vulnerable configurations ?
- cpe:2.3:a:cisco:cloud_email_security:-:*:*:*:*:*:*:*
-
cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3
- Cisco Email Security Appliance with AsyncOS 13.0
- Cisco Email Security Appliance v9.1
- Cisco Email Security Appliance 9.8