Lucene search

K
cve[email protected]CVE-2016-1440
HistoryJul 02, 2016 - 2:59 p.m.

CVE-2016-1440

2016-07-0214:59:09
CWE-399
web.nvd.nist.gov
21
cisco
wsa
denial of service
vulnerability
security
nvd
cve-2016-1440

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.3%

The proxy process on Cisco Web Security Appliance (WSA) devices through 9.1.0-070 allows remote attackers to cause a denial of service (CPU consumption) by establishing an FTP session and then improperly terminating the control connection after a file transfer, aka Bug ID CSCuy43468.

Affected configurations

NVD
Node
ciscoweb_security_applianceMatch5.6.0-623
OR
ciscoweb_security_applianceMatch6.0.0-000
OR
ciscoweb_security_applianceMatch7.1.0
OR
ciscoweb_security_applianceMatch7.1.1
OR
ciscoweb_security_applianceMatch7.1.2
OR
ciscoweb_security_applianceMatch7.1.3
OR
ciscoweb_security_applianceMatch7.1.4
OR
ciscoweb_security_applianceMatch7.5.0-000
OR
ciscoweb_security_applianceMatch7.5.0-825
OR
ciscoweb_security_applianceMatch7.5.1-000
OR
ciscoweb_security_applianceMatch7.5.2-000
OR
ciscoweb_security_applianceMatch7.5.2-hp2-303
OR
ciscoweb_security_applianceMatch7.7.0-000
OR
ciscoweb_security_applianceMatch7.7.0-608
OR
ciscoweb_security_applianceMatch7.7.1-000
OR
ciscoweb_security_applianceMatch7.7.5-835
OR
ciscoweb_security_applianceMatch8.0.0-000
OR
ciscoweb_security_applianceMatch8.0.5
OR
ciscoweb_security_applianceMatch8.0.5_hp1
OR
ciscoweb_security_applianceMatch8.0.6
OR
ciscoweb_security_applianceMatch8.0.6-078
OR
ciscoweb_security_applianceMatch8.0.6-119
OR
ciscoweb_security_applianceMatch8.0.7
OR
ciscoweb_security_applianceMatch8.0.7-142
OR
ciscoweb_security_applianceMatch8.0.8-mr-113
OR
ciscoweb_security_applianceMatch8.5.0-497
OR
ciscoweb_security_applianceMatch8.5.0.000
OR
ciscoweb_security_applianceMatch8.5.1-021
OR
ciscoweb_security_applianceMatch8.5.2-024
OR
ciscoweb_security_applianceMatch8.5.2-027
OR
ciscoweb_security_applianceMatch8.5.3-055
OR
ciscoweb_security_applianceMatch8.8.0-000
OR
ciscoweb_security_applianceMatch8.8.0-085
OR
ciscoweb_security_applianceMatch9.0.0-193
OR
ciscoweb_security_applianceMatch9.0_base
OR
ciscoweb_security_applianceMatch9.1.0-000
OR
ciscoweb_security_applianceMatch9.1.0-070

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.3%

Related for CVE-2016-1440