CVE-2016-6366
KEV
🔴 Łataj teraz
Przepełnienie bufora w Cisco ASA pozwala zdalnym uwierzytelnionym użytkownikom na wykonanie kodu.
CVSS
8.8
EPSS
91.4%
Exploit
weaponized
Vendor
cisco
Opis źródłowy (NVD)
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 91.4% |
| Opublikowano (NVD) | 2016-08-18 18:59:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 15:42:51 UTC |
Referencje
- http://blogs.cisco.com/security/shadow-brokers (psirt@cisco.com) [Exploit, Press/Media Coverage, Vendor Advisory]
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp (psirt@cisco.com) [Vendor Advisory]
- http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 (psirt@cisco.com) [Vendor Advisory]
- http://www.securityfocus.com/bid/92521 (psirt@cisco.com) [Broken Link, Not Applicable, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1036637 (psirt@cisco.com) [Broken Link, Third Party Advisory, VDB Entry]
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip (psirt@cisco.com) [Broken Link, Exploit]
- https://www.exploit-db.com/exploits/40258/ (psirt@cisco.com) [Third Party Advisory, VDB Entry]
- https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html (psirt@cisco.com) [Exploit, Technical Description]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]