Vulnerability Details : CVE-2016-1019
Used for ransomware!
Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2016-1019
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*
CVE-2016-1019 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Adobe Flash Player Arbitrary Code Execution Vulnerability
CISA required action:
The impacted product is end-of-life and should be disconnected if still in use.
CISA description:
Adobe Flash Player allows remote attackers to cause a denial of service or possibly execute arbitrary code.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2016-1019
Added on
2022-03-03
Action due date
2022-03-24
Exploit prediction scoring system (EPSS) score for CVE-2016-1019
81.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1019
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-04 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2016-1019
-
http://rhn.redhat.com/errata/RHSA-2016-0610.html
RHSA-2016:0610 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00055.html
[security-announce] openSUSE-SU-2016:1157-1: important: Security updateBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00012.html
[security-announce] openSUSE-SU-2016:0997-1: important: Security updateBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00009.html
[security-announce] openSUSE-SU-2016:0987-1: important: Security updateBroken Link
-
http://blogs.adobe.com/psirt/?p=1330
Adobe Product Security Incident Response Team (PSIRT) Blog | UPDATED: Security Advisory posted for Adobe Flash Player (APSA16-01)Broken Link;Vendor Advisory
-
https://helpx.adobe.com/security/products/flash-player/apsb16-10.html
Adobe Security BulletinVendor Advisory
-
http://www.securitytracker.com/id/1035491
Adobe Flash Player Type Confusion Error Lets Remote Users Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201606-08
Adobe Flash Player: Multiple vulnerabilities (GLSA 201606-08) — Gentoo securityThird Party Advisory
-
http://www.securityfocus.com/bid/85856
Adobe Flash Player CVE-2016-1019 Unspecified Remote Code Execution VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html
[security-announce] SUSE-SU-2016:1305-1: important: Security update forBroken Link
-
https://helpx.adobe.com/security/products/flash-player/apsa16-01.html
Adobe Security AdvisoryVendor Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-050
Microsoft Security Bulletin MS16-050 - Critical | Microsoft DocsPatch;Third Party Advisory;Vendor Advisory
-
https://www.fireeye.com/blog/threat-research/2016/04/cve-2016-1019_a_new.html
CVE-2016-1019: A New Flash Exploit Included in Magnitude Exploit Kit | FireEye IncBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html
[security-announce] openSUSE-SU-2016:1306-1: important: Security updateBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00010.html
[security-announce] SUSE-SU-2016:0990-1: important: Security update forBroken Link
Jump to