Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa | Vendor Advisory |
http://www.securityfocus.com/bid/93116 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036881 | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa | Vendor Advisory |
http://www.securityfocus.com/bid/93116 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036881 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/93116 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036881 - |
Information
Published : 2016-09-22 22:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6406
Mitre link : CVE-2016-6406
CVE.ORG link : CVE-2016-6406
JSON object : View
Products Affected
cisco
- email_security_appliance_firmware
CWE
CWE-264
Permissions, Privileges, and Access Controls