// For flags

CVE-2016-6360

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233.

Una vulnerabilidad en Advanced Malware Protection (AMP) para Cisco Email Security Appliances (ESA) y Web Security Appliances (WSA) podría permitir a un atacante remoto no autenticado provocar una condición de denegación de servicio (DoS) parcial debido al reinicio inesperado del proceso AMP. Productos afectados: Cisco AsyncOS Software para Email Security Appliances (ESA) versiones 9.5 y posteriores a la primera versión fija, Cisco AsyncOS Software para Web Security Appliances (WSA) todas las versiones previas a la primera versión fija. Más información: CSCux56406, CSCux59928. Lanzamientos conocidos afectados: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Lanzamientos conocidos solucionados: 9.7.1-066 WSA10.0.0-233.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-07-26 CVE Reserved
  • 2016-10-28 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.5.0-000
Search vendor "Cisco" for product "Email Security Appliance" and version "9.5.0-000"
-
Affected
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.5.0-201
Search vendor "Cisco" for product "Email Security Appliance" and version "9.5.0-201"
-
Affected
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.6.0-000
Search vendor "Cisco" for product "Email Security Appliance" and version "9.6.0-000"
-
Affected
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.6.0-042
Search vendor "Cisco" for product "Email Security Appliance" and version "9.6.0-042"
-
Affected
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.6.0-051
Search vendor "Cisco" for product "Email Security Appliance" and version "9.6.0-051"
-
Affected
Cisco
Search vendor "Cisco"
Email Security Appliance
Search vendor "Cisco" for product "Email Security Appliance"
9.7.0-125
Search vendor "Cisco" for product "Email Security Appliance" and version "9.7.0-125"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
8.8.0-085
Search vendor "Cisco" for product "Web Security Appliance" and version "8.8.0-085"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.0.0-193
Search vendor "Cisco" for product "Web Security Appliance" and version "9.0.0-193"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.0_base
Search vendor "Cisco" for product "Web Security Appliance" and version "9.0_base"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.1.0-000
Search vendor "Cisco" for product "Web Security Appliance" and version "9.1.0-000"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.1.0-070
Search vendor "Cisco" for product "Web Security Appliance" and version "9.1.0-070"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.1_base
Search vendor "Cisco" for product "Web Security Appliance" and version "9.1_base"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.5.0-235
Search vendor "Cisco" for product "Web Security Appliance" and version "9.5.0-235"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.5.0-284
Search vendor "Cisco" for product "Web Security Appliance" and version "9.5.0-284"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.5.0-444
Search vendor "Cisco" for product "Web Security Appliance" and version "9.5.0-444"
-
Affected
Cisco
Search vendor "Cisco"
Web Security Appliance
Search vendor "Cisco" for product "Web Security Appliance"
9.5_base
Search vendor "Cisco" for product "Web Security Appliance" and version "9.5_base"
-
Affected