CVE-2016-6366
Summary
| CVE | CVE-2016-6366 |
|---|---|
| State | PUBLISHED |
| Assigner | cisco |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-08-18 18:59:00 UTC |
| Updated | 2026-04-22 15:42:51 UTC |
| Description | Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.913890000 probability, percentile 0.996660000 (date 2026-04-22)
CISA KEV: Listed on 2022-05-24; due 2022-06-14; ransomware use Unknown
Problem Types: CWE-120 | n/a | CWE-120 CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | ADP | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 8.5 | AV:N/AC:M/Au:S/C:C/I:C/A:C |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
SingleConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:S/C:C/I:C/A:C
CISA Known Exploited Vulnerability
| Vendor | Cisco |
|---|---|
| Product | Adaptive Security Appliance (ASA) |
| Name | Cisco Adaptive Security Appliance (ASA) SNMP Buffer Overflow Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2016-6366 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Cisco | Adaptive Security Appliance Software | All | All | All | All |
| Hardware | Cisco | Pix Firewall 501 | - | All | All | All |
| Hardware | Cisco | Pix Firewall 506 | - | All | All | All |
| Hardware | Cisco | Pix Firewall 506e | - | All | All | All |
| Hardware | Cisco | Pix Firewall 515 | - | All | All | All |
| Hardware | Cisco | Pix Firewall 515e | - | All | All | All |
| Hardware | Cisco | Pix Firewall 520 | - | All | All | All |
| Hardware | Cisco | Pix Firewall 525 | - | All | All | All |
| Hardware | Cisco | Pix Firewall 535 | - | All | All | All |
| Operating System | Cisco | Pix Firewall Software | - | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco ASA SNMP Buffer Overflow Lets Remote Users Deny Service or Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Broken Link, Third Party Advisory, VDB Entry |
| Cisco Adaptive Security Appliance Products CVE-2016-6366 Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Broken Link, Not Applicable, Third Party Advisory, VDB Entry |
| Cisco ASA 8.x - 'EXTRABACON' Authentication Bypass - Hardware remote Exploit | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Third Party Advisory, VDB Entry |
| Page not found · GitHub · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Broken Link, Exploit |
| www.cisa.gov/known-exploited-vulnerabilities-catalog | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | www.cisa.gov | US Government Resource |
| zerosum0x0: Reverse Engineering Cisco ASA for EXTRABACON Offsets | af854a3a-2127-422b-91ae-364da2661108 | zerosum0x0.blogspot.com | Exploit, Technical Description |
| Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Vendor Advisory |
| The Shadow Brokers EPICBANANA and EXTRABACON Exploits | af854a3a-2127-422b-91ae-364da2661108 | blogs.cisco.com | Exploit, Press/Media Coverage, Vendor Advisory |
| Cisco Event Response: Cisco ASA and IOS Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.