Lucene search

K
cve[email protected]CVE-2016-6356
HistoryOct 28, 2016 - 10:59 a.m.

CVE-2016-6356

2016-10-2810:59:06
CWE-20
web.nvd.nist.gov
17
cisco
asyncos
software
email security
appliances
vulnerability
cve-2016-6356
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.006 Low

EPSS

Percentile

77.8%

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz63143. Known Affected Releases: 8.5.7-042 9.7.0-125. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.

Affected configurations

NVD
Node
ciscoemail_security_applianceMatch3.3.1-09
OR
ciscoemail_security_applianceMatch7.1.0
OR
ciscoemail_security_applianceMatch7.1.1
OR
ciscoemail_security_applianceMatch7.1.2
OR
ciscoemail_security_applianceMatch7.1.3
OR
ciscoemail_security_applianceMatch7.1.4
OR
ciscoemail_security_applianceMatch7.1.5
OR
ciscoemail_security_applianceMatch7.3.0
OR
ciscoemail_security_applianceMatch7.3.1
OR
ciscoemail_security_applianceMatch7.3.2
OR
ciscoemail_security_applianceMatch7.5.0
OR
ciscoemail_security_applianceMatch7.5.1
OR
ciscoemail_security_applianceMatch7.5.2
OR
ciscoemail_security_applianceMatch7.5.2-201
OR
ciscoemail_security_applianceMatch7.6.0
OR
ciscoemail_security_applianceMatch7.6.1-000
OR
ciscoemail_security_applianceMatch7.6.1-gpl-022
OR
ciscoemail_security_applianceMatch7.6.2
OR
ciscoemail_security_applianceMatch7.6.3-000
OR
ciscoemail_security_applianceMatch7.6.3-025
OR
ciscoemail_security_applianceMatch7.7.0-000
OR
ciscoemail_security_applianceMatch7.7.1-000
OR
ciscoemail_security_applianceMatch7.8.0
OR
ciscoemail_security_applianceMatch7.8.0-311
OR
ciscoemail_security_applianceMatch8.0.1-023
OR
ciscoemail_security_applianceMatch8.0_base
OR
ciscoemail_security_applianceMatch8.5.0-000
OR
ciscoemail_security_applianceMatch8.5.0-er1-198
OR
ciscoemail_security_applianceMatch8.5.6-052
OR
ciscoemail_security_applianceMatch8.5.6-073
OR
ciscoemail_security_applianceMatch8.5.6-074
OR
ciscoemail_security_applianceMatch8.5.6-106
OR
ciscoemail_security_applianceMatch8.5.6-113
OR
ciscoemail_security_applianceMatch8.5.7-042
OR
ciscoemail_security_applianceMatch8.6.0
OR
ciscoemail_security_applianceMatch8.6.0-011
OR
ciscoemail_security_applianceMatch8.9.0
OR
ciscoemail_security_applianceMatch8.9.1-000
OR
ciscoemail_security_applianceMatch8.9.2-032
OR
ciscoemail_security_applianceMatch9.0.0
OR
ciscoemail_security_applianceMatch9.0.0-212
OR
ciscoemail_security_applianceMatch9.0.0-461
OR
ciscoemail_security_applianceMatch9.0.5-000
OR
ciscoemail_security_applianceMatch9.1.0
OR
ciscoemail_security_applianceMatch9.1.0-011
OR
ciscoemail_security_applianceMatch9.1.0-032
OR
ciscoemail_security_applianceMatch9.1.0-101
OR
ciscoemail_security_applianceMatch9.4.0
OR
ciscoemail_security_applianceMatch9.4.4-000
OR
ciscoemail_security_applianceMatch9.5.0-000
OR
ciscoemail_security_applianceMatch9.5.0-201
OR
ciscoemail_security_applianceMatch9.6.0-000
OR
ciscoemail_security_applianceMatch9.6.0-042
OR
ciscoemail_security_applianceMatch9.6.0-051
OR
ciscoemail_security_applianceMatch9.7.0-125
OR
ciscoemail_security_applianceMatch9.7.1-066

CNA Affected

[
  {
    "product": "Cisco AsyncOS through 9.7.0-125",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco AsyncOS through 9.7.0-125"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.006 Low

EPSS

Percentile

77.8%