CVE-2016-1380
Published May 25, 2016
Last updated 8 years ago
Overview
- Description
- Cisco AsyncOS 8.0 before 8.0.6-119 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (proxy-process hang) via a crafted HTTP POST request, aka Bug ID CSCuo12171.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C867BF-2CD0-4058-9738-22C769B03D97" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFBF729F-2AD0-4291-AF41-184CCA230D28" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D8750D2-5250-43BE-AC50-981902C0CF5C" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5A171CD-A1FB-44AE-B252-9916626AEEDD" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6003553-A114-42E0-B817-D176F3A6112B" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "892F3569-985A-43FD-8A65-440A528A29FD" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7514E1C3-42DC-4738-AF6C-3004FAC5BD6C" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C62AB23C-9F58-403D-B0E7-8ED3F5A4FE1B" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D725328-3720-4C45-BF53-295A70BFCD92" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E9AF842-92F9-43A7-834A-0FFB3B619EDA" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.1-021:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C75625C-3C19-4449-B992-279325170CD2" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4954BDC0-0A4B-4EF7-BFD2-2FF6FAE2FCA4" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-027:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4F98B8B-8B27-4253-B8EF-5782F57DB654" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.3-055:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "729E3778-4BCA-46C6-AF3D-A2C10CDDB1F1" } ], "operator": "OR" } ], "operator": "AND" } ]