← Back to CVEs
CVE-2016-6357
N/ADescription
A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
CVE Details
CVSS v3.1 ScoreN/A
Published10/28/2016
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
cisco:email_security_appliance
Weaknesses (CWE)
CWE-388
References
http://www.securityfocus.com/bid/93909(psirt@cisco.com)
http://www.securitytracker.com/id/1037114(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5(psirt@cisco.com)
http://www.securityfocus.com/bid/93909(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037114(af854a3a-2127-422b-91ae-364da2661108)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.