Cisco Firepower Management Center before 6.1 and FireSIGHT System Software before 6.1, when certain malware blocking options are enabled, allow remote attackers to bypass malware detection via crafted fields in HTTP headers, aka Bug ID CSCuz44482.
{"openvas": [{"lastseen": "2019-10-09T15:20:09", "description": "A vulnerability in the malicious file detection and blocking features of\nCisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection\nmechanisms on an affected system.\n\nThe vulnerability is due to improper input validation of fields in HTTP headers. An attacker could exploit this\nvulnerability by crafting specific file content on a server or persuading a user to click a specific link. A\nsuccessful exploit could allow the attacker to bypass malicious file detection or blocking policies that are\nconfigured for the system, which could allow malware to pass through the system undetected.", "cvss3": {}, "published": "2016-09-08T00:00:00", "type": "openvas", "title": "Cisco FireSIGHT System Software Malware Bypass Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6396"], "modified": "2019-10-09T00:00:00", "id": "OPENVAS:1361412562310106233", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310106233", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Cisco FireSIGHT System Software Malware Bypass Vulnerability\n#\n# Authors:\n# Christian Kuersteiner <christian.kuersteiner@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:cisco:firesight_management_center\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.106233\");\n script_cve_id(\"CVE-2016-6396\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_version(\"2019-10-09T06:43:33+0000\");\n\n script_name(\"Cisco FireSIGHT System Software Malware Bypass Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n script_tag(name:\"summary\", value:\"A vulnerability in the malicious file detection and blocking features of\nCisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection\nmechanisms on an affected system.\n\nThe vulnerability is due to improper input validation of fields in HTTP headers. An attacker could exploit this\nvulnerability by crafting specific file content on a server or persuading a user to click a specific link. A\nsuccessful exploit could allow the attacker to bypass malicious file detection or blocking policies that are\nconfigured for the system, which could allow malware to pass through the system undetected.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2019-10-09 06:43:33 +0000 (Wed, 09 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-09-08 10:40:02 +0700 (Thu, 08 Sep 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"This script is Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_cisco_firesight_management_center_version.nasl\", \"gb_cisco_firesight_management_center_http_detect.nasl\");\n script_mandatory_keys(\"cisco_firesight_management_center/version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE, nofork:TRUE ) ) exit( 0 );\n\naffected = make_list(\n '5.1.0',\n '5.1.0.1',\n '5.1.0.2',\n '5.1.0.3',\n '5.1.1',\n '5.1.1.1',\n '5.1.1.2',\n '5.1.1.3',\n '5.1.1.4',\n '5.1.1,5',\n '5.1.1.6',\n '5.1.1.8',\n '5.1.1.9',\n '5.1.1.10',\n '5.1.1.11',\n '5.2.0',\n '5.2.0.1',\n '5.2.0.2',\n '5.2.0.3',\n '5.2.0.4',\n '5.2.0.5',\n '5.2.0.6',\n '5.2.0.8',\n '5.3.0',\n '5.3.0.1',\n '5.3.0.2',\n '5.3.0.3',\n '5.3.0.4',\n '5.3.0.5',\n '5.3.0.6',\n '5.3.0.7',\n '5.3.1.1',\n '5.3.1.2',\n '5.3.1.3',\n '5.3.1',\n '5.3.1.5',\n '5.3.1.4',\n '5.3.1.7',\n '5.4.0',\n '5.4.0.1',\n '5.4.0.2',\n '5.4.0.3',\n '5.4.0.4',\n '5.4.0.5',\n '5.4.0.6',\n '5.4.1',\n '5.4.1.2',\n '5.4.1.3',\n '5.4.1.4',\n '6.0.0',\n '6.0.0.1',\n '6.0.1' );\n\nforeach af ( affected )\n{\n if( version == af )\n {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-04-07T18:45:34", "description": "A vulnerability in the malicious file detection and blocking features of\nCisco Firepower Management Center could allow an unauthenticated, remote attacker to bypass malware detection\nmechanisms on an affected system.", "cvss3": {}, "published": "2016-09-08T00:00:00", "type": "openvas", "title": "Cisco Firepower Management Center Malware Bypass Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6396"], "modified": "2020-04-03T00:00:00", "id": "OPENVAS:1361412562310106232", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310106232", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Cisco Firepower Management Center Malware Bypass Vulnerability\n#\n# Authors:\n# Christian Kuersteiner <christian.kuersteiner@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:cisco:firepower_management_center\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.106232\");\n script_cve_id(\"CVE-2016-6396\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_version(\"2020-04-03T09:54:35+0000\");\n\n script_name(\"Cisco Firepower Management Center Malware Bypass Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 6.1\");\n\n script_tag(name:\"summary\", value:\"A vulnerability in the malicious file detection and blocking features of\nCisco Firepower Management Center could allow an unauthenticated, remote attacker to bypass malware detection\nmechanisms on an affected system.\");\n\n script_tag(name:\"insight\", value:\"The vulnerability is due to improper input validation of fields in HTTP\nheaders. An attacker could exploit this vulnerability by crafting specific file content on a server or\npersuading a user to click a specific link.\");\n\n script_tag(name:\"impact\", value:\"A successful exploit could allow the attacker to bypass malicious file\ndetection or blocking policies that are configured for the system, which could allow malware to pass through\nthe system undetected.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2020-04-03 09:54:35 +0000 (Fri, 03 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-09-08 10:11:15 +0700 (Thu, 08 Sep 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_cisco_firepower_management_center_consolidation.nasl\");\n script_mandatory_keys(\"cisco/firepower_management_center/detected\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif (!version = get_app_version(cpe:CPE, nofork:TRUE))\n exit(0);\n\nif (version_is_less(version: version, test_version: \"6.1.0\")) {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "cisco": [{"lastseen": "2023-03-02T18:29:42", "description": "A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system.\n\nThe vulnerability is due to improper input validation of fields in HTTP headers. An attacker could exploit this vulnerability by crafting specific file content on a server or persuading a user to click a specific link. A successful exploit could allow the attacker to bypass malicious file detection or blocking policies that are configured for the system, which could allow malware to pass through the system undetected.\n\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\n\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1[\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1\"]", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2016-09-07T16:00:00", "type": "cisco", "title": "Cisco Firepower Management Center and FireSIGHT System Software Malware Bypass Vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6396"], "modified": "2016-09-07T16:00:00", "id": "CISCO-SA-20160907-FSSS1", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}]}