We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2016-6463



Description

A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuz85823. Known Affected Releases: 10.0.0-082 9.7.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131.

Reserved 2016-07-26 | Published 2016-11-19 | Updated 2024-08-06 | Assigner cisco

Problem types

unspecified

References

tools.cisco.com/...coSecurityAdvisory/cisco-sa-20161116-esa2

www.securityfocus.com/bid/94363 (94363) vdb-entry

cve.org (CVE-2016-6463)

nvd.nist.gov (CVE-2016-6463)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2016-6463

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.