First published: Sat Nov 19 2016(Updated: )
A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuz85823. Known Affected Releases: 10.0.0-082 9.7.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =9.7.0-125 | |
Cisco Email Security Appliance Firmware | =9.7.1-06 | |
Cisco Email Security Appliance Firmware | =10.0.0-082 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6463 has a medium severity rating, indicating a moderate risk of compromise.
To fix CVE-2016-6463, update your Cisco Email Security Appliance to a fixed version as recommended by Cisco.
CVE-2016-6463 affects Cisco Email Security Appliances running versions 9.7.0-125, 9.7.1-06, and 10.0.0-082.
Yes, CVE-2016-6463 can be exploited by an unauthenticated remote attacker.
CVE-2016-6463 allows attackers to bypass Advanced Malware Protection filters, compromising email security.