VAR-201609-0310

Vulnerability from variot - Updated: 2025-04-13 23:41

Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvb16317

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0310",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.2"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.1b"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.1a"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1e"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1a"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(2.0\\)"
      },
      {
        "model": "ace 4700 series application control engine appliance a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "8.0"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1"
      },
      {
        "model": "ace 4700 series application control engine appliance a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "8.0a"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.4"
      },
      {
        "model": "ace 4700 series application control engine appliance a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7b"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.4"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(1.1\\)"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(2.1e\\)"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5_base"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(1.2\\)"
      },
      {
        "model": "ace 4700 series application control engine appliance a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1a"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(2.1\\)"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.5"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ace 4700 series application control engine appliance a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "ace 4700 series application control engine appliance a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.5"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(1.0\\)"
      },
      {
        "model": "ace application control engine module a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7a"
      },
      {
        "model": "ace 4700 series application control engine appliance a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1a"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ace application control engine module a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.6"
      },
      {
        "model": "ace 4700 series application control engine appliance a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7a"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.6"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.7"
      },
      {
        "model": "ace application control engine module a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "8.0"
      },
      {
        "model": "ace 4700 series application control engine appliance a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.7"
      },
      {
        "model": "ace application control engine module a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "8.0a"
      },
      {
        "model": "ace 4700 series application control engine appliance a5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1b"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ace application control engine module a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1"
      },
      {
        "model": "ace 4700 series application control engine appliance",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "a5\\(3.0\\)"
      },
      {
        "model": "ace application control engine module a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7b"
      },
      {
        "model": "ace 4700 series application control engine appliance a4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ace application control engine module a3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ace 4700 series application control engine the appliance software",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "a5 3.3"
      },
      {
        "model": "application control engine module",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "ace30 a5 3.3"
      },
      {
        "model": "ace30 application control engine module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "ace application control engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "47100"
      },
      {
        "model": "ace30 application control engine module a5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ace application control engine a5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4710"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:application_control_engine_4700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:cisco:application_control_engine_module",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-6399",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-6399",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-95219",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-6399",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6399",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6399",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201609-127",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95219",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317. \nAn attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID  CSCvb16317",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6399",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "92867",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1036748",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639",
        "trust": 0.8
      },
      {
        "db": "NSFOCUS",
        "id": "34781",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95219",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "id": "VAR-201609-0310",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      }
    ],
    "trust": 0.28722944
  },
  "last_update_date": "2025-04-13T23:41:57.253000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20160908-ace",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160908-ace"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/92867"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1036748"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6399"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6399"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/34781"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "db": "BID",
        "id": "92867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-09-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "date": "2016-09-08T00:00:00",
        "db": "BID",
        "id": "92867"
      },
      {
        "date": "2016-09-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "date": "2016-09-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "date": "2016-09-12T10:59:11.507000",
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95219"
      },
      {
        "date": "2016-11-24T02:04:00",
        "db": "BID",
        "id": "92867"
      },
      {
        "date": "2016-09-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      },
      {
        "date": "2016-09-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2016-6399"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco ACE30 Application Control Engine Modules and  ACE 4700 Application Control Engine Service disruption on the appliance  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004639"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201609-127"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…