Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-6458


A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to use a content filter for email attachments that are protected or encrypted. More Information: CSCva52546. Known Affected Releases: 10.0.0-125 9.7.1-066.


Published

2016-11-19T03:03:01.383

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco email_security_appliance_firmware 9.7.1-066 Yes
Operating System cisco email_security_appliance_firmware 9.7.2-046 Yes
Operating System cisco email_security_appliance_firmware 9.7.2-047 Yes
Operating System cisco email_security_appliance_firmware 9.7.2-054 Yes
Operating System cisco email_security_appliance_firmware 9.9.6-026 Yes
Operating System cisco email_security_appliance_firmware 9.9_base Yes
Operating System cisco email_security_appliance_firmware 10.0.0-124 Yes
Operating System cisco email_security_appliance_firmware 10.0.0-125 Yes

References