Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-1423


A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.


Published

2016-10-28T10:59:00.213

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco email_security_appliance 8.9.0 Yes
Application cisco email_security_appliance 8.9.1-000 Yes
Application cisco email_security_appliance 8.9.2-032 Yes
Application cisco email_security_appliance 9.0.0 Yes
Application cisco email_security_appliance 9.0.0-212 Yes
Application cisco email_security_appliance 9.0.0-461 Yes
Application cisco email_security_appliance 9.0.5-000 Yes
Application cisco email_security_appliance 9.1.0 Yes
Application cisco email_security_appliance 9.1.0-011 Yes
Application cisco email_security_appliance 9.1.0-032 Yes
Application cisco email_security_appliance 9.1.0-101 Yes

References