5
CVSSv2

CVE-2016-1345

Published: 01/04/2016 Updated: 03/12/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cisco FireSIGHT System Software 5.4.0 up to and including 6.0.1 and ASA with FirePOWER Services 5.4.0 up to and including 6.0.0.1 allow remote malicious users to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firesight system software 6.0.1

cisco firesight system software 6.0.0.1

cisco firesight system software 5.4.1

cisco firesight system software 5.4.0

cisco asa with firepower services 5.4.0.1

cisco asa with firepower services 5.4.0

cisco firesight system software 5.4.1.4

cisco firesight system software 5.4.1.3

cisco asa with firepower services 6.0.0.1

cisco asa with firepower services 6.0.0

cisco firesight system software 5.4.0.3

cisco firesight system software 5.4.0.2

cisco firesight system software 5.4.1.2

cisco firesight system software 6.0.0

cisco asa with firepower services 5.4.0.3

cisco asa with firepower services 5.4.0.2

cisco asa with firepower services 5.4.0.6

cisco firesight system software 5.4.0.6

cisco firesight system software 5.4.0.5

cisco firesight system software 5.4.0.4

cisco firesight system software 5.4.0.1

cisco asa with firepower services 5.4.0.5

cisco asa with firepower services 5.4.0.4

Recent Articles

Cisco, Snort scramble to plug malware hole
The Register • Richard Chirgwin • 31 Mar 2016

Firepower devices might let attackers through

A URL sanitisation bug has Cisco pushing a patch for its Firepower system software. As the advisory for CVE-2016-1345 explains, the software doesn't properly validate fields in HTTP headers. A crafted HTTP request can bypass malicious file detection, or could block policies configured on the system. Sysadmins can check whether they've configured file actions in software in the system dashboard: the Malware and File menu displays file action policies in place, with the rules and actions in place....