Lucene search

K
cveCiscoCVE-2016-6367
HistoryAug 18, 2016 - 6:59 p.m.

CVE-2016-6367

2016-08-1818:59:01
CWE-77
cisco
web.nvd.nist.gov
841
In Wild
4
cisco
asa
software
local users
privileges
cli commands
bug
security vulnerability
cve-2016-6367
nvd

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.964

Percentile

99.6%

Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.

Affected configurations

Nvd
Node
ciscoadaptive_security_appliance_softwareRange7.2.08.4\(3\)
OR
ciscoadaptive_security_appliance_softwareRange8.59.0\(1\)
AND
ciscoasa_5500Match-
OR
ciscoasa_5500-xMatch-
OR
ciscoasa_5500_csc-ssmMatch-
OR
ciscoasa_5505Match-
OR
ciscoasa_5506-xMatch-
OR
ciscoasa_5506h-xMatch-
OR
ciscoasa_5506w-xMatch-
OR
ciscoasa_5508-xMatch-
OR
ciscoasa_5510Match-
OR
ciscoasa_5512-xMatch-
OR
ciscoasa_5515-xMatch-
OR
ciscoasa_5516-xMatch-
OR
ciscoasa_5520Match-
OR
ciscoasa_5525-xMatch-
OR
ciscoasa_5540Match-
OR
ciscoasa_5545-xMatch-
OR
ciscoasa_5550Match-
OR
ciscoasa_5555-xMatch-
OR
ciscoasa_5580Match-
OR
ciscoasa_5585-xMatch-
OR
ciscofirewall_services_moduleMatch-
OR
ciscopix_firewall_501Match-
OR
ciscopix_firewall_506Match-
OR
ciscopix_firewall_506eMatch-
OR
ciscopix_firewall_515Match-
OR
ciscopix_firewall_515eMatch-
OR
ciscopix_firewall_520Match-
OR
ciscopix_firewall_525Match-
OR
ciscopix_firewall_535Match-
VendorProductVersionCPE
ciscoadaptive_security_appliance_software*cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
ciscoasa_5500-cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*
ciscoasa_5500-x-cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*
ciscoasa_5500_csc-ssm-cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*
ciscoasa_5505-cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
ciscoasa_5506-x-cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*
ciscoasa_5506h-x-cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*
ciscoasa_5506w-x-cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*
ciscoasa_5508-x-cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*
ciscoasa_5510-cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 301

Social References

More

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.964

Percentile

99.6%