First published: Mon Sep 12 2016(Updated: )
Cisco Firepower Management Center before 6.1 and FireSIGHT System Software before 6.1, when certain malware blocking options are enabled, allow remote attackers to bypass malware detection via crafted fields in HTTP headers, aka Bug ID CSCuz44482.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FireSIGHT System Software | =5.1.0 | |
Cisco FireSIGHT System Software | =5.1.0.1 | |
Cisco FireSIGHT System Software | =5.1.0.2 | |
Cisco FireSIGHT System Software | =5.1.0.3 | |
Cisco FireSIGHT System Software | =5.1.1 | |
Cisco FireSIGHT System Software | =5.1.1.1 | |
Cisco FireSIGHT System Software | =5.1.1.2 | |
Cisco FireSIGHT System Software | =5.1.1.3 | |
Cisco FireSIGHT System Software | =5.1.1.4 | |
Cisco FireSIGHT System Software | =5.1.1.5 | |
Cisco FireSIGHT System Software | =5.1.1.6 | |
Cisco FireSIGHT System Software | =5.1.1.8 | |
Cisco FireSIGHT System Software | =5.1.1.9 | |
Cisco FireSIGHT System Software | =5.1.1.10 | |
Cisco FireSIGHT System Software | =5.1.1.11 | |
Cisco FireSIGHT System Software | =5.2.0 | |
Cisco FireSIGHT System Software | =5.2.0.1 | |
Cisco FireSIGHT System Software | =5.2.0.2 | |
Cisco FireSIGHT System Software | =5.2.0.3 | |
Cisco FireSIGHT System Software | =5.2.0.4 | |
Cisco FireSIGHT System Software | =5.2.0.5 | |
Cisco FireSIGHT System Software | =5.2.0.6 | |
Cisco FireSIGHT System Software | =5.2.0.8 | |
Cisco FireSIGHT System Software | =5.3.0 | |
Cisco FireSIGHT System Software | =5.3.0.1 | |
Cisco FireSIGHT System Software | =5.3.0.2 | |
Cisco FireSIGHT System Software | =5.3.0.3 | |
Cisco FireSIGHT System Software | =5.3.0.4 | |
Cisco FireSIGHT System Software | =5.3.0.5 | |
Cisco FireSIGHT System Software | =5.3.0.6 | |
Cisco FireSIGHT System Software | =5.3.0.7 | |
Cisco FireSIGHT System Software | =5.3.1 | |
Cisco FireSIGHT System Software | =5.3.1.1 | |
Cisco FireSIGHT System Software | =5.3.1.2 | |
Cisco FireSIGHT System Software | =5.3.1.3 | |
Cisco FireSIGHT System Software | =5.3.1.4 | |
Cisco FireSIGHT System Software | =5.3.1.5 | |
Cisco FireSIGHT System Software | =5.3.1.7 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 | |
Cisco FireSIGHT System Software | =5.4.0.2 | |
Cisco FireSIGHT System Software | =5.4.0.3 | |
Cisco FireSIGHT System Software | =5.4.0.4 | |
Cisco FireSIGHT System Software | =5.4.0.5 | |
Cisco FireSIGHT System Software | =5.4.0.6 | |
Cisco FireSIGHT System Software | =5.4.1 | |
Cisco FireSIGHT System Software | =5.4.1.2 | |
Cisco FireSIGHT System Software | =5.4.1.3 | |
Cisco FireSIGHT System Software | =5.4.1.4 | |
Cisco FireSIGHT System Software | =6.0.0 | |
Cisco FireSIGHT System Software | =6.0.0.1 | |
Cisco FireSIGHT System Software | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6396 is rated as high severity due to its potential to allow remote attackers to bypass malware detection.
To mitigate CVE-2016-6396, upgrade to the Cisco Firepower Management Center version 6.1 or later.
CVE-2016-6396 affects Cisco Firepower Management Center and FireSIGHT System Software versions prior to 6.1.
CVE-2016-6396 allows attackers to bypass malware detection through crafted HTTP header fields.
Yes, CVE-2016-6396 is considered widely exploitable due to the nature of the vulnerability and the affected products.