CVE-2016-6357

A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*
cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/93909 - () http://www.securityfocus.com/bid/93909 -
References () http://www.securitytracker.com/id/1037114 - () http://www.securitytracker.com/id/1037114 -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5 - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5 - Vendor Advisory

Information

Published : 2016-10-28 10:59

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6357

Mitre link : CVE-2016-6357

CVE.ORG link : CVE-2016-6357


JSON object : View

Products Affected

cisco

  • email_security_appliance
CWE
CWE-388

7PK - Errors