First published: Fri Oct 28 2016(Updated: )
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, if the software is configured with message or content filters to scan incoming email attachments. More Information: CSCuw03606, CSCux59734. Known Affected Releases: 8.0.0-000 8.5.6-106 9.0.0-000 9.1.0-032 9.6.0-042 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.1.1-038 9.7.1-066.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =8.0.1-023 | |
Cisco Email Security Appliance Firmware | =8.0_base | |
Cisco Email Security Appliance Firmware | =8.5.0-000 | |
Cisco Email Security Appliance Firmware | =8.5.0-er1-198 | |
Cisco Email Security Appliance Firmware | =8.5.6-052 | |
Cisco Email Security Appliance Firmware | =8.5.6-073 | |
Cisco Email Security Appliance Firmware | =8.5.6-074 | |
Cisco Email Security Appliance Firmware | =8.5.6-106 | |
Cisco Email Security Appliance Firmware | =8.5.6-113 | |
Cisco Email Security Appliance Firmware | =8.5.7-042 | |
Cisco Email Security Appliance Firmware | =8.6.0 | |
Cisco Email Security Appliance Firmware | =8.6.0-011 | |
Cisco Email Security Appliance Firmware | =8.9.0 | |
Cisco Email Security Appliance Firmware | =8.9.1-000 | |
Cisco Email Security Appliance Firmware | =8.9.2-032 | |
Cisco Email Security Appliance Firmware | =9.0.0 | |
Cisco Email Security Appliance Firmware | =9.0.0-212 | |
Cisco Email Security Appliance Firmware | =9.0.0-461 | |
Cisco Email Security Appliance Firmware | =9.0.5-000 | |
Cisco Email Security Appliance Firmware | =9.1.0 | |
Cisco Email Security Appliance Firmware | =9.1.0-011 | |
Cisco Email Security Appliance Firmware | =9.1.0-032 | |
Cisco Email Security Appliance Firmware | =9.1.0-101 | |
Cisco Email Security Appliance Firmware | =9.1.1-000 | |
Cisco Email Security Appliance Firmware | =9.4.0 | |
Cisco Email Security Appliance Firmware | =9.4.4-000 | |
Cisco Email Security Appliance Firmware | =9.5.0-000 | |
Cisco Email Security Appliance Firmware | =9.5.0-201 | |
Cisco Email Security Appliance Firmware | =9.6.0-000 | |
Cisco Email Security Appliance Firmware | =9.6.0-042 | |
Cisco Email Security Appliance Firmware | =9.7.0-125 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1480 has a medium severity rating, indicating that it poses a moderate risk to affected systems.
To fix CVE-2016-1480, upgrade the Cisco Email Security Appliance firmware to a version that addresses this vulnerability.
CVE-2016-1480 affects multiple versions of Cisco Email Security Appliances and Web Security Appliances running specific versions of AsyncOS.
Yes, CVE-2016-1480 can be exploited by an unauthenticated remote attacker to bypass user filters.
Currently, the recommended action for CVE-2016-1480 is to upgrade the affected Cisco appliances to the latest firmware.