Vulnerabilites related to cisco - web_security_appliance_8.0.5
Vulnerability from fkie_nvd
Published
2016-10-28 10:59
Modified
2024-11-21 02:56
Summary
A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.
Impacted products
Vendor Product Version
cisco email_security_appliance 8.0.1-023
cisco email_security_appliance 8.0_base
cisco email_security_appliance 8.5.0-000
cisco email_security_appliance 8.5.0-er1-198
cisco email_security_appliance 8.5.6-052
cisco email_security_appliance 8.5.6-073
cisco email_security_appliance 8.5.6-074
cisco email_security_appliance 8.5.6-106
cisco email_security_appliance 8.5.6-113
cisco email_security_appliance 8.5.7-042
cisco email_security_appliance 8.6.0
cisco email_security_appliance 8.6.0-011
cisco email_security_appliance 8.9.0
cisco email_security_appliance 8.9.1-000
cisco email_security_appliance 8.9.2-032
cisco email_security_appliance 9.0.0
cisco email_security_appliance 9.0.0-212
cisco email_security_appliance 9.0.0-461
cisco email_security_appliance 9.0.5-000
cisco email_security_appliance 9.1.0
cisco email_security_appliance 9.1.0-011
cisco email_security_appliance 9.1.0-032
cisco email_security_appliance 9.1.0-101
cisco email_security_appliance 9.1.1-000
cisco email_security_appliance 9.4.0
cisco email_security_appliance 9.4.4-000
cisco email_security_appliance 9.5.0-000
cisco email_security_appliance 9.5.0-201
cisco email_security_appliance 9.6.0-000
cisco email_security_appliance 9.6.0-042
cisco email_security_appliance 9.6.0-051
cisco email_security_appliance 9.7.0-125
cisco email_security_appliance 9.7.1-066
cisco email_security_appliance 9.9.6-026
cisco email_security_appliance 9.9_base
cisco web_security_appliance 5.6.0-623
cisco web_security_appliance 6.0.0-000
cisco web_security_appliance 7.1.0
cisco web_security_appliance 7.1.1
cisco web_security_appliance 7.1.2
cisco web_security_appliance 7.1.3
cisco web_security_appliance 7.1.4
cisco web_security_appliance 7.5.0-000
cisco web_security_appliance 7.5.0-825
cisco web_security_appliance 7.5.1-000
cisco web_security_appliance 7.5.2-000
cisco web_security_appliance 7.5.2-hp2-303
cisco web_security_appliance 7.7.0-000
cisco web_security_appliance 7.7.0-608
cisco web_security_appliance 7.7.1-000
cisco web_security_appliance 7.7.5-835
cisco web_security_appliance 8.0.0-000
cisco web_security_appliance 8.0.5
cisco web_security_appliance 8.0.6
cisco web_security_appliance 8.0.6-078
cisco web_security_appliance 8.0.6-119
cisco web_security_appliance 8.0.7
cisco web_security_appliance 8.0.7-142
cisco web_security_appliance 8.0.8-mr-113
cisco web_security_appliance 8.5.0-497
cisco web_security_appliance 8.5.0.000
cisco web_security_appliance 8.5.1-021
cisco web_security_appliance 8.5.2-024
cisco web_security_appliance 8.5.2-027
cisco web_security_appliance 8.5.3-055
cisco web_security_appliance 8.8.0-000
cisco web_security_appliance 8.8.0-085
cisco web_security_appliance 9.0.0-193
cisco web_security_appliance 9.0_base
cisco web_security_appliance 9.1.0-000
cisco web_security_appliance 9.1.0-070
cisco web_security_appliance 9.1_base
cisco web_security_appliance 9.5.0-235
cisco web_security_appliance 9.5.0-284
cisco web_security_appliance 9.5.0-444
cisco web_security_appliance 9.5_base
cisco web_security_appliance_8.0.5 hot_patch_1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FABFD96-9076-4838-A775-7DA478214760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D070904-FF6A-4356-A6B9-FC572CF4ADEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB92F9E-9FA2-4D50-82C2-FF0A20EB42FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9AFCF6-AFC3-4466-AB77-DA77090BBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*",
              "matchCriteriaId": "A511EEC7-A7B4-46A0-9182-42B6FFB0E103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8A45A9-0835-4F4D-99D1-4E894EE95B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*",
              "matchCriteriaId": "C69F7FA3-F8FD-430F-B70C-FBFC3C1A2D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EFD829C-2BA8-4EA6-A846-74776A05D105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A831B2A-A23C-4BB4-B64C-ADD2C77D96E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*",
              "matchCriteriaId": "46895808-4225-42FB-BA8B-12ADFADAB4AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E7090B-6FB0-4161-8534-BD2561B1C203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CA88FC-047E-4EA4-B3E9-E903DD1892CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A4A2C13-FB68-4DAD-AC0E-A90260655F33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574E66D-783A-48E6-A04A-16E0B1A56EBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE973E6A-4BE5-44D7-9E66-B966377F2315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6412D3-E788-45F8-B4E5-4795CD88F3C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*",
              "matchCriteriaId": "79408E18-14BE-486A-AAD1-95A3871CCD21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*",
              "matchCriteriaId": "44F4ABDB-16DC-4D8F-B2D8-9724133F40BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A2F388-FFE1-43BD-A9B6-D21043F86AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F398CF-66B8-4BE1-8586-1DCD1FF8C3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF05089-FDC2-4D78-9949-B313A11A3FF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*",
              "matchCriteriaId": "22602224-5873-4B62-A3B4-66B9E590B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C301DE3-99C7-415A-9D1B-8DDD00E4E5D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0298F5-CE72-4A8A-9AA9-5770BE6081F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA369D6F-7011-49CF-B0E7-D1B7A2D1B719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D328123-3F80-4686-A464-574CDFF67247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17D2028-25C5-4234-8723-7040DCFBEE92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF846D4C-F7A2-4C27-A2A3-CFE5E76DE5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D691BA-8205-4C49-851B-2FDC1F22F641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED373FBD-1BB7-4532-946F-9DA2DF33A8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A450E5F-D02B-4F4D-9844-794D6A39D923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E682A3-28D4-4163-B047-DAD05D404128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*",
              "matchCriteriaId": "72DADB2C-D86D-44B5-B87B-289990A7D9B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F508B007-27AD-483F-B220-B62C84892617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.9_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95BBCED-65C8-4433-884B-0088B8B15E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:5.6.0-623:*:*:*:*:*:*:*",
              "matchCriteriaId": "3463A482-F89B-4136-AEB3-EB20EA0160A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:6.0.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "B10586A4-2BB8-4193-927D-F1775797E4BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "115E5118-AB49-4CAF-9DA2-712AA6605C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E320F3AC-9C05-409F-BB54-E3FB1BAAE063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "900CE698-301B-4B56-B441-D925E924FE36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F148C6AE-7B86-4AED-AFE0-9D91A8142005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "83910933-0B59-453C-B015-99D2CDE7DF3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F89337-B550-4985-BA36-31695D1865C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.5.0-825:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC6B22F-CDA0-4EFA-A370-D00D0CD138DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.5.1-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DFC3A10-C014-4B25-A4EF-96241DF06379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.5.2-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "7197CAB4-01ED-4502-89FA-DB5E3B0B6435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.5.2-hp2-303:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4976F9-1C44-45C2-9C40-420376911113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "9156B2AE-89FD-4702-A99F-32DE2E9C3A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.7.0-608:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E907A2-C0C9-4288-BAA7-B36D112EE4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.7.1-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "085D1356-236E-4C35-8C82-7F9BA758C46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:7.7.5-835:*:*:*:*:*:*:*",
              "matchCriteriaId": "A276AE73-EF2D-4D0F-83D6-02CCACFA373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C867BF-2CD0-4058-9738-22C769B03D97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFBF729F-2AD0-4291-AF41-184CCA230D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D8750D2-5250-43BE-AC50-981902C0CF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A171CD-A1FB-44AE-B252-9916626AEEDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6003553-A114-42E0-B817-D176F3A6112B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "892F3569-985A-43FD-8A65-440A528A29FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*",
              "matchCriteriaId": "7514E1C3-42DC-4738-AF6C-3004FAC5BD6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62AB23C-9F58-403D-B0E7-8ED3F5A4FE1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E9AF842-92F9-43A7-834A-0FFB3B619EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B25873-F2FA-4876-9222-362EDC3FB00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.1-021:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C75625C-3C19-4449-B992-279325170CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*",
              "matchCriteriaId": "4954BDC0-0A4B-4EF7-BFD2-2FF6FAE2FCA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-027:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F98B8B-8B27-4253-B8EF-5782F57DB654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.3-055:*:*:*:*:*:*:*",
              "matchCriteriaId": "729E3778-4BCA-46C6-AF3D-A2C10CDDB1F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDB2C1-E72C-49A3-B96D-433A9F6A3716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F98FEDA-89EF-40BA-BBD3-3EBD6DD33EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD5471D-6A95-4BF2-9ECB-3F7AE74BCE57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "04E5E7DC-1197-49BD-8D83-E69015F25622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-000:*:*:*:*:*:*:*",
              "matchCriteriaId": "7703E48F-6AAE-42DF-91E4-7205E9A7AD1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*",
              "matchCriteriaId": "8782B7BC-03C5-4866-9807-14EF9A818EB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8677C11-CD70-4A92-9E06-7ABC4753F13A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-235:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BEBC56B-BC37-4A5C-90D9-D412B978A743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA50ED3-74F8-4B13-BFA9-97EA6B43C701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.5.0-444:*:*:*:*:*:*:*",
              "matchCriteriaId": "56127D49-142B-4660-9FEF-715E419E1643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance:9.5_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D0113C0-9BD3-49DD-AAA3-57BF6148D054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:web_security_appliance_8.0.5:hot_patch_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7939BA6-5962-466D-99DA-9975F98AB18E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el filtrado de mensajes de email y contenido para cabeceras Multipurpose Internet Mail Extensions (MIME) mal formadas de Cisco AsyncOS Software para Cisco Email Security Appliances (ESA) y Web Security Appliances (WSA) podr\u00eda permitir a un atacante remoto no autenticado eludir la funcionalidad de filtrado del dispositivo objetivo. Los emails que deber\u00edan haber sido puestos en cuarentena ser\u00edan procesados en su lugar. Productos afectados: Esta vulnerabilidad afecta a todas las versiones previas a la primera versi\u00f3n fija de Cisco AsyncOS Software para Cisco ESA y Cisco WSA tanto en la aplicaci\u00f3n virtual como en la aplicaci\u00f3n hardware que sean configuradas con filtros de mensaje o contenido para escanear adjuntos de emails entrantes. M\u00e1s informaci\u00f3n: CSCuy54740, CSCuy75174. Lanzamientos conocidos afectados: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Lanzamientos conocidos solucionados: 10.0.0-125 9.1.1-038 9.7.2-047."
    }
  ],
  "id": "CVE-2016-6372",
  "lastModified": "2024-11-21T02:56:00.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-10-28T10:59:11.387",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/93911"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1037118"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1037119"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/93911"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1037118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1037119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2016-6372
Vulnerability from cvelistv5
Published
2016-10-28 10:00
Modified
2024-08-06 01:29
Severity ?
Summary
A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.
Impacted products
Vendor Product Version
n/a Cisco AsyncOS through WSA10.0.0-000 Version: Cisco AsyncOS through WSA10.0.0-000
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:19.537Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"
          },
          {
            "name": "93911",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93911"
          },
          {
            "name": "1037118",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037118"
          },
          {
            "name": "1037119",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037119"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco AsyncOS through WSA10.0.0-000",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco AsyncOS through WSA10.0.0-000"
            }
          ]
        }
      ],
      "datePublic": "2016-10-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "unspecified",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"
        },
        {
          "name": "93911",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93911"
        },
        {
          "name": "1037118",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037118"
        },
        {
          "name": "1037119",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037119"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2016-6372",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco AsyncOS through WSA10.0.0-000",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco AsyncOS through WSA10.0.0-000"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "unspecified"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"
            },
            {
              "name": "93911",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93911"
            },
            {
              "name": "1037118",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037118"
            },
            {
              "name": "1037119",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037119"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2016-6372",
    "datePublished": "2016-10-28T10:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:19.537Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}