Lucene search

K
cve[email protected]CVE-2016-1481
HistoryOct 28, 2016 - 10:59 a.m.

CVE-2016-1481

2016-10-2810:59:03
CWE-20
web.nvd.nist.gov
20
cisco
asyncos
software
email security
appliances
vulnerability
dos
cve-2016-1481
nvd
cscux59873

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter that contains certain rules. More Information: CSCux59873. Known Affected Releases: 8.5.6-106 9.1.0-032 9.7.0-125. Known Fixed Releases: 9.1.1-038 9.7.1-066.

Affected configurations

NVD
Node
ciscoemail_security_applianceMatch8.5.0-000
OR
ciscoemail_security_applianceMatch8.5.0-er1-198
OR
ciscoemail_security_applianceMatch8.5.6-052
OR
ciscoemail_security_applianceMatch8.5.6-073
OR
ciscoemail_security_applianceMatch8.5.6-074
OR
ciscoemail_security_applianceMatch8.5.6-106
OR
ciscoemail_security_applianceMatch8.5.6-113
OR
ciscoemail_security_applianceMatch8.5.7-042
OR
ciscoemail_security_applianceMatch8.6.0
OR
ciscoemail_security_applianceMatch8.6.0-011
OR
ciscoemail_security_applianceMatch8.9.0
OR
ciscoemail_security_applianceMatch8.9.1-000
OR
ciscoemail_security_applianceMatch8.9.2-032
OR
ciscoemail_security_applianceMatch9.0.0
OR
ciscoemail_security_applianceMatch9.0.0-212
OR
ciscoemail_security_applianceMatch9.0.0-461
OR
ciscoemail_security_applianceMatch9.0.5-000
OR
ciscoemail_security_applianceMatch9.1.0
OR
ciscoemail_security_applianceMatch9.1.0-011
OR
ciscoemail_security_applianceMatch9.1.0-032
OR
ciscoemail_security_applianceMatch9.1.0-101
OR
ciscoemail_security_applianceMatch9.1.1-000
OR
ciscoemail_security_applianceMatch9.4.0
OR
ciscoemail_security_applianceMatch9.4.4-000
OR
ciscoemail_security_applianceMatch9.5.0-000
OR
ciscoemail_security_applianceMatch9.5.0-201
OR
ciscoemail_security_applianceMatch9.6.0-000
OR
ciscoemail_security_applianceMatch9.6.0-042
OR
ciscoemail_security_applianceMatch9.6.0-051
OR
ciscoemail_security_applianceMatch9.7.0-125

CNA Affected

[
  {
    "product": "Cisco AsyncOS through 9.7.0-125",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco AsyncOS through 9.7.0-125"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%