CVE-2016-6399 (GCVE-0-2016-6399)
Vulnerability from cvelistv5 – Published: 2016-09-12 10:00 – Updated: 2024-08-06 01:29
VLAI?
Summary
Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:29:19.656Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20160908 Cisco ACE30 Application Control Engine Module and Cisco ACE 4710 Application Control Engine Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
},
{
"name": "92867",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92867"
},
{
"name": "1036748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036748"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-09-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20160908 Cisco ACE30 Application Control Engine Module and Cisco ACE 4710 Application Control Engine Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
},
{
"name": "92867",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92867"
},
{
"name": "1036748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036748"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6399",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20160908 Cisco ACE30 Application Control Engine Module and Cisco ACE 4710 Application Control Engine Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
},
{
"name": "92867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92867"
},
{
"name": "1036748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036748"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2016-6399",
"datePublished": "2016-09-12T10:00:00.000Z",
"dateReserved": "2016-07-26T00:00:00.000Z",
"dateUpdated": "2024-08-06T01:29:19.656Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-6399\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2016-09-12T10:59:11.507\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317.\"},{\"lang\":\"es\",\"value\":\"Dispositivos Cisco ACE30 Application Control Engine Module hasta la versi\u00f3n A5 3.3 y ACE 4700 Application Control Engine hasta la versi\u00f3n A5 3.3 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes (1) SSL o (2) TLS manipulados, vulnerabilidad tambi\u00e9n conocida como Bug ID CSCvb16317.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B95E42-77DA-4AFB-A159-7809CD95D24B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968D39EB-5481-4698-B3A9-C2E90BFD88FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE5326B-B86B-434B-B86A-8703CD1CA872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0625AAB8-ADA5-4495-8A01-87DAE0C573B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3583B054-0D5D-41AD-8508-0E5D87491045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7170B3-B3DA-4667-8ADE-09EA0D17C37F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE45DC-11D4-429C-890F-F9E117930AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"680510A7-CF93-4C86-A556-F0C9511AF3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C10C1C9-356A-4D47-BB4B-58AD940199E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521441F7-8388-4F58-A262-6B8057209FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CB323B-7913-4B2F-AE69-95D34ED6A83F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7722C303-3AE4-4078-947B-7A648FC5477E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0786FAF6-44D0-4F2E-952E-2CE4CEE30A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB9C402-2A7B-4701-A260-46C6D0E63050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F40CA11-A160-4307-9305-28DA4938945B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430CA0DA-0402-4FFB-9170-7F08DE70C36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BEDD60-ACF6-441E-85B0-8E93C6F5CE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF39113-6665-484B-AA2E-2FB49BCDEC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AABE9B-4A09-477F-A139-7CB40C14AA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0FF5BA5-AC61-4244-A7C2-F9811AD13C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F571AD7F-14B9-498C-8F06-D1DF61B6EF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B2425F-7EFA-4599-8A7E-2B0454A58077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8A6203D-DF5E-46B9-BFCD-D41FC729193F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB594F8-3673-42E8-8E8B-996DEA75E815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFB0D00-A082-4930-9D6D-CFB1CDB632EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E975AAC-A44A-4042-80F5-959989B785AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FEAE36-71F8-40C9-954C-42B57CC1BE8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAB49D71-F1FD-43E3-A245-50E4A2F62606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428DCAD9-B5AD-45DC-91D7-27535F286957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(1.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2091508E-84D9-496B-B4E1-9BAC927F982A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(1.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB7E381-E849-42F6-8201-E32D1747E06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(1.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F266A5E5-9455-4EC5-BBF2-AAA2CA2A60AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(2.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A23695F0-B2FE-46F1-9328-56B1EF00A112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(2.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4239B16-7380-48E4-992D-479351DF1AC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(2.1e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E476F81E-7F90-442A-8FF1-45FCFCF096C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\\\(3.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6351F63A-D5B2-4EE3-AC7D-3CDA0A217E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE7CF67-7B2F-40A1-8F52-639483094568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED884ACC-89C8-461D-A238-36316F507441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE014E6-0224-402B-AFF0-7B7FA67382A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8FF44C-CC30-43F7-832E-C88390482CA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F7DF627-2A9D-42CD-9929-26A32E687F00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7B42BF-80B8-40AB-BAF9-9E73216F8524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE68EF35-7CD7-49A3-A143-4C47012C012D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABAB9218-3909-4B08-92EC-8431FC5C8D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F2BEAC-D53A-4630-8530-ED24ACC820A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659F4ACE-9564-45AC-B85D-D0625853FFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2539AF6-E914-4279-A54D-2E7652AFD7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2917FB57-2BBF-4A77-AEE7-C6D660D44A20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1863CF65-736C-44BD-80A2-B9DE33A4797A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABB8883-0476-4E83-9F75-40ABFF806786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8264DF-8037-4A4C-8C08-E332E9649347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4DC4A0-44E9-41C1-99A7-82499AC8577B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38482D95-999B-4A40-A37A-71150E48ED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90762C72-8DA2-446C-B3A8-DC9DCB33DD06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD6BAEB1-8271-475F-ADD0-D3EDF0773DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDF5356-429E-4CD5-8031-5E52CF3FF118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AB46CA-9775-4EC8-8419-13B0224251BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50A418B-1AC6-40BA-B80B-29313C95F030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C673B2B9-2A26-47C2-B553-2AE8A41916AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD80BBE-813F-4B2E-B05D-3A96686FA8D4\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92867\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1036748\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92867\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…