Vulnerability Details : CVE-2016-1345
Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726.
Vulnerability category: Input validation
Products affected by CVE-2016-1345
- cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firesight_system_software:5.4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1345
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1345
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-1345
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1345
-
http://www.securitytracker.com/id/1035437
Cisco ASA FirePOWER Services Input Validation Flaw Lets Remote Users Bypass Malware Detection on the Target System - SecurityTracker
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp
Cisco Firepower Malware Block Bypass VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1035439
Snort Input Validation Flaw Lets Remote Users Bypass Malware Detection on the Target System - SecurityTracker
-
http://www.securitytracker.com/id/1035438
Sourcefire 3D System Appliance Input Validation Flaw Lets Remote Users Bypass Malware Detection on the Target System - SecurityTracker
Jump to