Vulnerability Details : CVE-2016-6360
A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2016-6360
Probability of exploitation activity in the next 30 days: 0.41%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 70 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-6360
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-6360
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6360
-
http://www.securitytracker.com/id/1037121
Cisco Web Security Appliance JAR Processing Bug Lets Remote Users Cause the Target Advanced Malware Protection Service to Restart - SecurityTracker
-
http://www.securityfocus.com/bid/93910
Multiple Cisco Products CVE-2016-6360 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1037120
Cisco Email Security Appliance Lets Remote Users Cause the Target Advanced Malware Protection Service to Crash - SecurityTracker
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa3
Cisco Email and Web Security Appliance JAR Advanced Malware Protection DoS VulnerabilityVendor Advisory
Products affected by CVE-2016-6360
- cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.1.0-000:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.5.0-235:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.0_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.1_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.5.0-444:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:web_security_appliance:9.5_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*