CVE-2016-6465
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047.
Una vulnerabilidad en la funcionalidad de filtro de contenido de Cisco AsyncOS Software para Cisco Email Security Appliances y Cisco Web Security Appliances puede permitir a un atacante remoto no autenticado eludir los filtros de usuario que están configurados para el dispositivo afectado. Productos Afectados: Esta vulnerabilidad afecta a todos los lanzamientos previos al primer lanzamiento reparado de Cisco AsyncOS Software tanto para versión virtual como para versión hardware de los siguientes productos Cisco: Cisco Email Security Appliances (ESAs) que está configurado para utilizar filtros de mensaje o contenido que escanean los archivos adjuntos en correos electrónicos entrantes; Cisco Web Security Appliances (WSAs) que está configurado para utilizar servicios que escanean el contenido web al que se ha accedido. Más información: CSCva90076, CSCvb06764. Lanzamientos Afectados Conocidos: 10.0.0-125 8.5.7-042 9.7.2-047.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-07-26 CVE Reserved
- 2016-12-14 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/94901 | Third Party Advisory | |
http://www.securitytracker.com/id/1037404 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa | 2017-01-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Email Security Appliance Search vendor "Cisco" for product "Email Security Appliance" | 8.5.7-042 Search vendor "Cisco" for product "Email Security Appliance" and version "8.5.7-042" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Email Security Appliance Search vendor "Cisco" for product "Email Security Appliance" | 9.7.2-047 Search vendor "Cisco" for product "Email Security Appliance" and version "9.7.2-047" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Email Security Appliance Search vendor "Cisco" for product "Email Security Appliance" | 10.0.0-125 Search vendor "Cisco" for product "Email Security Appliance" and version "10.0.0-125" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Email Security Appliance Search vendor "Cisco" for product "Email Security Appliance" | 10.0.0-232 Search vendor "Cisco" for product "Email Security Appliance" and version "10.0.0-232" | - |
Affected
|