CVE-2016-6465

Published on: 12/13/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Certain versions of Email Security Appliance from Cisco contain the following vulnerability:

A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047.

  • CVE-2016-6465 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 4.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Cisco Email Security Appliance CVE-2016-6465 Remote Security Bypass Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 94901
Cisco Email Security Appliance TAR File Processing Error Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1037404
Cisco Email Security Appliance Content Filter Bypass Vulnerability Vendor Advisory
tools.cisco.com
text/html
URL Logo CONFIRM tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoEmail Security Appliance10.0.0-125AllAllAll
ApplicationCiscoEmail Security Appliance10.0.0-232AllAllAll
ApplicationCiscoEmail Security Appliance8.5.7-042AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-047AllAllAll
ApplicationCiscoEmail Security Appliance10.0.0-125AllAllAll
ApplicationCiscoEmail Security Appliance10.0.0-232AllAllAll
ApplicationCiscoEmail Security Appliance8.5.7-042AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-047AllAllAll
  • cpe:2.3:a:cisco:email_security_appliance:10.0.0-125:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:10.0.0-232:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:10.0.0-125:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:10.0.0-232:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*: