cisco firepower-threat-defense-software CVE-2016-6366 vulnerability in Cisco Products
Published on August 18, 2016

Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.

Vendor Advisory Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This Cisco Adaptive Security Appliance (ASA) SNMP Buffer Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. A buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASA software could allow an attacker to cause a reload of the affected system or to remotely execute code.

The following remediation steps are recommended / required by June 14, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2016-6366 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2016-6366 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2016-6366

You can be notified by stack.watch whenever vulnerabilities like CVE-2016-6366 are published in these products:

 
 
 
 
 

What versions are vulnerable to CVE-2016-6366?