First published: Sat Nov 19 2016(Updated: )
A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCva13456. Known Affected Releases: 10.0.0-082 10.0.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =9.7.1-06 | |
Cisco Email Security Appliance Firmware | =10.0.0-082 | |
Cisco Email Security Appliance Firmware | =10.0.0-125 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6462 is rated as high severity due to its potential to allow attackers to bypass security filters.
To remediate CVE-2016-6462, update your Cisco Email Security Appliance firmware to a version that includes the necessary security patches.
CVE-2016-6462 affects Cisco Email Security Appliance firmware versions 9.7.1-06, 10.0.0-082, and 10.0.0-125.
No, CVE-2016-6462 can be exploited by unauthenticated remote attackers.
CVE-2016-6462 enables attackers to bypass Advanced Malware Protection (AMP) filters.