First published: Fri Apr 01 2016(Updated: )
Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA with FirePOWER Services | =5.4.0 | |
Cisco ASA with FirePOWER Services | =5.4.0.1 | |
Cisco ASA with FirePOWER Services | =5.4.0.2 | |
Cisco ASA with FirePOWER Services | =5.4.0.3 | |
Cisco ASA with FirePOWER Services | =5.4.0.4 | |
Cisco ASA with FirePOWER Services | =5.4.0.5 | |
Cisco ASA with FirePOWER Services | =5.4.0.6 | |
Cisco ASA with FirePOWER Services | =6.0.0 | |
Cisco ASA with FirePOWER Services | =6.0.0.1 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 | |
Cisco FireSIGHT System Software | =5.4.0.2 | |
Cisco FireSIGHT System Software | =5.4.0.3 | |
Cisco FireSIGHT System Software | =5.4.0.4 | |
Cisco FireSIGHT System Software | =5.4.0.5 | |
Cisco FireSIGHT System Software | =5.4.0.6 | |
Cisco FireSIGHT System Software | =5.4.1 | |
Cisco FireSIGHT System Software | =5.4.1.2 | |
Cisco FireSIGHT System Software | =5.4.1.3 | |
Cisco FireSIGHT System Software | =5.4.1.4 | |
Cisco FireSIGHT System Software | =6.0.0 | |
Cisco FireSIGHT System Software | =6.0.0.1 | |
Cisco FireSIGHT System Software | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.