ID

VAR-201612-0227


CVE

CVE-2016-1411


TITLE

plural Cisco Security For appliance AsyncOS Vulnerability in software update function spoofing update server

Trust: 0.8

sources: JVNDB: JVNDB-2016-006303

DESCRIPTION

A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019. Vendors have confirmed this vulnerability Bug ID CSCul88715 , CSCul94617 , CSCul94627 It is released as.A remote attacker could impersonate an update server. There is a middleman security bypass vulnerability in CiscoAsyncOSSoftware. Allows an attacker to exploit a vulnerability to perform an unauthorized operation by performing a man-in-the-middle attack. Cisco AsyncOS Software is prone to security-bypass vulnerability. This may lead to other attacks. This issue is being tracked by Cisco Bug ID's CSCul88715, CSCul94617 and CSCul94627. Cisco AsyncOS is an operating system used in these products

Trust: 2.52

sources: NVD: CVE-2016-1411 // JVNDB: JVNDB-2016-006303 // CNVD: CNVD-2016-12890 // BID: 94791 // VULHUB: VHN-90230

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-12890

AFFECTED PRODUCTS

vendor:ciscomodel:content security management appliancescope:eqversion:9.1.0-033

Trust: 1.6

vendor:ciscomodel:web security appliancescope:eqversion:7.7.5-835

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.5.0-er1-198

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.0.1-023

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.5.1-021

Trust: 1.6

vendor:ciscomodel:content security management appliancescope:eqversion:9.1.0-031

Trust: 1.6

vendor:ciscomodel:content security management appliancescope:eqversion:9.6.0

Trust: 1.6

vendor:ciscomodel:content security management appliancescope:eqversion:9.1.0-103

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.5.0-000

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:7.6.3-025

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:7.5.2-201

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.1.0-004

Trust: 1.0

vendor:ciscomodel:web security appliancescope:eqversion:7.7.0-608

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.1.0

Trust: 1.0

vendor:ciscomodel:web security appliancescope:eqversion:8.8.0-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:7.5.2-hp2-303

Trust: 1.0

vendor:ciscomodel:asyncosscope: - version: -

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:web security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:content security management appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncos softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:web security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asyncos softwarescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-12890 // BID: 94791 // JVNDB: JVNDB-2016-006303 // CNNVD: CNNVD-201612-276 // NVD: CVE-2016-1411

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1411
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1411
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-12890
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201612-276
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90230
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1411
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-12890
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90230
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1411
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-12890 // VULHUB: VHN-90230 // JVNDB: JVNDB-2016-006303 // CNNVD: CNNVD-201612-276 // NVD: CVE-2016-1411

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-90230 // JVNDB: JVNDB-2016-006303 // NVD: CVE-2016-1411

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201612-276

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201612-276

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-006303

PATCH

title:cisco-sa-20161207-asyncosurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asyncos

Trust: 0.8

title:CiscoAsyncOSSoftware middleman security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/86521

Trust: 0.6

title:Cisco AsyncOS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66315

Trust: 0.6

sources: CNVD: CNVD-2016-12890 // JVNDB: JVNDB-2016-006303 // CNNVD: CNNVD-201612-276

EXTERNAL IDS

db:NVDid:CVE-2016-1411

Trust: 3.4

db:BIDid:94791

Trust: 2.6

db:JVNDBid:JVNDB-2016-006303

Trust: 0.8

db:CNNVDid:CNNVD-201612-276

Trust: 0.7

db:CNVDid:CNVD-2016-12890

Trust: 0.6

db:VULHUBid:VHN-90230

Trust: 0.1

sources: CNVD: CNVD-2016-12890 // VULHUB: VHN-90230 // BID: 94791 // JVNDB: JVNDB-2016-006303 // CNNVD: CNNVD-201612-276 // NVD: CVE-2016-1411

REFERENCES

url:http://www.securityfocus.com/bid/94791

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161207-asyncos

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1411

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1411

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-12890 // VULHUB: VHN-90230 // BID: 94791 // JVNDB: JVNDB-2016-006303 // CNNVD: CNNVD-201612-276 // NVD: CVE-2016-1411

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 94791

SOURCES

db:CNVDid:CNVD-2016-12890
db:VULHUBid:VHN-90230
db:BIDid:94791
db:JVNDBid:JVNDB-2016-006303
db:CNNVDid:CNNVD-201612-276
db:NVDid:CVE-2016-1411

LAST UPDATE DATE

2024-11-23T22:59:26.670000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-12890date:2016-12-23T00:00:00
db:VULHUBid:VHN-90230date:2016-12-15T00:00:00
db:BIDid:94791date:2016-12-20T01:08:00
db:JVNDBid:JVNDB-2016-006303date:2016-12-20T00:00:00
db:CNNVDid:CNNVD-201612-276date:2016-12-13T00:00:00
db:NVDid:CVE-2016-1411date:2024-11-21T02:46:23.943

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-12890date:2016-12-23T00:00:00
db:VULHUBid:VHN-90230date:2016-12-14T00:00:00
db:BIDid:94791date:2016-12-07T00:00:00
db:JVNDBid:JVNDB-2016-006303date:2016-12-20T00:00:00
db:CNNVDid:CNNVD-201612-276date:2016-12-12T00:00:00
db:NVDid:CVE-2016-1411date:2016-12-14T00:59:00.173