This page was not yet optimized for use on mobile devices.
CVE-2020-3548
Data
| Vulnerability ID | CVE-2020-3548 |
|---|---|
| Published on | 18.11.2024 16:15 |
| Severity | HIGH |
Vulnerable configurations
-
cpe:2.3:a:cisco:email_security_appliance:-:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*,
cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*,
…
Vulnerable certificates
Automated inference - use with caution
Our automated heuristics matched this CVE to certificates listed below. The matches are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Common Criteria certificates Display network
- IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3
- Cisco Email Security Appliance with AsyncOS 13.0
- Cisco Email Security Appliance v9.1
- Cisco Email Security Appliance 9.8