This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.
Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 31 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cisco:secure_email_gateway:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-01T21:59:42.233Z
Reserved: 2023-11-08T15:08:07.660Z
Link: CVE-2024-20401
Updated: 2024-08-01T21:59:42.233Z
Status : Analyzed
Published: 2024-07-17T17:15:13.540
Modified: 2025-07-31T17:06:38.833
Link: CVE-2024-20401
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:23:17Z