CVE-2016-6357
Severity CVSS v4.0:
Pending analysis
Type:
CWE-388
Error Handling
Publication date:
28/10/2016
Last modified:
12/04/2025
Description
A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/93909
- http://www.securitytracker.com/id/1037114
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5
- http://www.securityfocus.com/bid/93909
- http://www.securitytracker.com/id/1037114
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5



