CVE-2016-6366
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
Published
2016-08-18T18:59:00.117
Last Modified
2025-04-12T10:46:40.837
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 8.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:S/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: SINGLE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
6.8
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://blogs.cisco.com/security/shadow-brokers
Exploit, Press/Media Coverage, Vendor Advisory
([email protected])
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
Vendor Advisory
([email protected])
-
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516
Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/92521
Broken Link, Not Applicable, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1036637
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip
Broken Link, Exploit
([email protected])
-
https://www.exploit-db.com/exploits/40258/
Third Party Advisory, VDB Entry
([email protected])
-
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html
Exploit, Technical Description
([email protected])
-
http://blogs.cisco.com/security/shadow-brokers
Exploit, Press/Media Coverage, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/92521
Broken Link, Not Applicable, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1036637
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/40258/
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html
Exploit, Technical Description
(af854a3a-2127-422b-91ae-364da2661108)