First published: Thu Sep 22 2016(Updated: )
Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =9.1.2-023 | |
Cisco Email Security Appliance Firmware | =9.1.2-028 | |
Cisco Email Security Appliance Firmware | =9.1.2-036 | |
Cisco Email Security Appliance Firmware | =9.7.2-046 | |
Cisco Email Security Appliance Firmware | =9.7.2-047 | |
Cisco Email Security Appliance Firmware | =9.7.2-054 | |
Cisco Email Security Appliance Firmware | =10.0.0-124 | |
Cisco Email Security Appliance Firmware | =10.0.0-125 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6406 is classified as a high severity vulnerability due to the potential for remote attackers to gain root access.
To fix CVE-2016-6406, upgrade the Cisco Email Security Appliance to a version that is 1.0.2-065 or later for the Enrollment Client.
CVE-2016-6406 affects Cisco Email Security Appliance devices running specific AsyncOS versions listed in the vulnerability details.
Yes, CVE-2016-6406 can be exploited remotely by attackers who establish a connection to the affected devices.
The potential impacts of CVE-2016-6406 include unauthorized access and control over the affected Cisco Email Security Appliances.