CVE-2016-1369
Published May 5, 2016
Last updated 8 years ago
Overview
- Description
- The Adaptive Security Appliance (ASA) 5585-X FirePOWER Security Services Processor (SSP) module for Cisco ASA with FirePOWER Services 5.3.1 through 6.0.0 misconfigures kernel logging, which allows remote attackers to cause a denial of service (resource consumption, and inspection outage or module outage) via a flood of crafted IP traffic, aka Bug ID CSCux19922.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C1F5880-B633-4B89-8D4D-6DB5C1E11516" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32328E7E-2D2A-4604-90E0-7B91C21F1662" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8C72F82-238A-496E-9B01-F545889DE972" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AB63124-15FC-434A-9BC3-B8072BB74DD4" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC9D5C8-A2F7-4A4D-9672-BA92D3F70299" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3162DAB2-0866-4427-9B6D-58B025DFD0F0" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C51E5901-A395-4208-B642-4DD23A6B63A2" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B6488E2-4B6A-4C93-A9CF-AA32013A1605" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08314129-10D6-421C-AEE1-348460EBDD0C" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02D8F14A-53A6-44B2-B2A1-3353C3A451C2" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA6DA0A1-3C6D-47EA-8066-30BF7FB765BB" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ED7ED81-9025-4F8D-A458-BC91A90FDCEF" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC2A704-4148-4F73-A447-424CB9E1A2D3" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08373044-E3BE-442C-9C2E-500775B77FA1" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69EB4A85-F881-4665-A725-3F77AF13CAB4" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:5.4.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8C8CAC6-7F7E-47F1-8206-F146CF43D74F" }, { "criteria": "cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2239F826-AAFA-4354-9BED-2C33AEF983D8" } ], "operator": "OR" } ] } ]