{"api_version":"1","generated_at":"2026-05-16T05:04:46+00:00","cve":"CVE-2016-1443","urls":{"html":"https://cve.report/CVE-2016-1443","api":"https://cve.report/api/cve/CVE-2016-1443.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-1443","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-1443"},"summary":{"title":"CVE-2016-1443","description":"The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.","state":"PUBLISHED","assigner":"cisco","published_at":"2016-07-07 14:59:04","updated_at":"2026-05-06 22:30:45"},"problem_types":["CWE-254","n/a"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.8","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg","name":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco AMP Threat Grid Unauthorized Clean IP Access Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-1443","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1443","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"1.4.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1443","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"amp_threat_grid_appliance","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T22:55:14.667Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20160706 Cisco AMP Threat Grid Unauthorized Clean IP Access Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-07-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-07-07T14:57:01.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"20160706 Cisco AMP Threat Grid Unauthorized Clean IP Access Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","ID":"CVE-2016-1443","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20160706 Cisco AMP Threat Grid Unauthorized Clean IP Access Vulnerability","refsource":"CISCO","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg"}]}}}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2016-1443","datePublished":"2016-07-07T14:00:00.000Z","dateReserved":"2016-01-04T00:00:00.000Z","dateUpdated":"2024-08-05T22:55:14.667Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2016-07-07 14:59:04","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["CWE-254","n/a"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.0:*:*:*:*:*:*:*","matchCriteriaId":"2E7BF740-0A6B-4CF3-AAF2-82639DD1FC1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.1:*:*:*:*:*:*:*","matchCriteriaId":"21A3E4A7-575A-4905-A7DE-ED7CC271C639"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.2:*:*:*:*:*:*:*","matchCriteriaId":"67A01851-3BCF-478A-A7E3-4AA806ED7035"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"3D613E3D-F0B3-487D-B419-8741AB101417"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.3:*:*:*:*:*:*:*","matchCriteriaId":"2AA1940D-A59C-4486-80C0-E8C4BD877DF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4:*:*:*:*:*:*:*","matchCriteriaId":"C303ED7C-BE13-4753-A2D8-68161A2312D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"84C8A220-4DD3-4417-90C8-3F92BA98175F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"A14A27F0-090F-4A92-8B8E-2AFBBFF99A95"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.3:*:*:*:*:*:*:*","matchCriteriaId":"49BC08DF-E7FB-49E4-B69F-81456DCB6F2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.4:*:*:*:*:*:*:*","matchCriteriaId":"501A2CB3-36C2-4526-BAE8-267481510A7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.5:*:*:*:*:*:*:*","matchCriteriaId":"3D675FFB-2A52-466A-B352-0A861C26F853"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:1.4.6:*:*:*:*:*:*:*","matchCriteriaId":"D84A018C-1B8A-471B-94C6-B1EDF35F2013"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2338A78-9ED8-41A6-B725-77207ED0ED5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"CB6177F2-8C73-4843-B31D-C869D5A2748F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"BAAC6654-0C3D-4FF0-B449-B70FAB92119C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"29699833-1198-48C7-BB1D-86C4DA87323B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"59C978F6-AD1D-466C-A402-1BA3AAFCFD4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:amp_threat_grid_appliance:2.1:*:*:*:*:*:*:*","matchCriteriaId":"BD0D0717-6CEB-4AF0-AB54-6D19726AC605"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"1443","Ordinal":"1","Title":"CVE-2016-1443","CVE":"CVE-2016-1443","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"1443","Ordinal":"1","NoteData":"The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.","Type":"Description","Title":"CVE-2016-1443"},{"CveYear":"2016","CveId":"1443","Ordinal":"2","NoteData":"2016-07-07","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"1443","Ordinal":"3","NoteData":"2016-07-07","Type":"Other","Title":"Modified"}]}}}