CVE-2016-6465
Published on: 12/13/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:11 PM UTC
Certain versions of Email Security Appliance from Cisco contain the following vulnerability:
A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047.
- CVE-2016-6465 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | REQUIRED | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | LOW | NONE | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco Email Security Appliance CVE-2016-6465 Remote Security Bypass Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
Cisco Email Security Appliance TAR File Processing Error Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
Cisco Email Security Appliance Content Filter Bypass Vulnerability | Vendor Advisory tools.cisco.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Email Security Appliance | 10.0.0-125 | All | All | All |
Application | Cisco | Email Security Appliance | 10.0.0-232 | All | All | All |
Application | Cisco | Email Security Appliance | 8.5.7-042 | All | All | All |
Application | Cisco | Email Security Appliance | 9.7.2-047 | All | All | All |
Application | Cisco | Email Security Appliance | 10.0.0-125 | All | All | All |
Application | Cisco | Email Security Appliance | 10.0.0-232 | All | All | All |
Application | Cisco | Email Security Appliance | 8.5.7-042 | All | All | All |
Application | Cisco | Email Security Appliance | 9.7.2-047 | All | All | All |
- cpe:2.3:a:cisco:email_security_appliance:10.0.0-125:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:10.0.0-232:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:10.0.0-125:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:10.0.0-232:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*: