Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-6367
Deferred
Known KEV
More InfoOfficial Page
Source-psirt@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-18 Aug, 2016 | 18:59
Updated At-12 Apr, 2025 | 10:46

Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-05-242022-06-14Cisco Adaptive Security Appliance (ASA) CLI Remote Code Execution VulnerabilityApply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:L/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>Versions from 7.2.0(inclusive) to 8.4\(3\)(exclusive)
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>Versions from 8.5(inclusive) to 9.0\(1\)(exclusive)
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5500>>-
cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5500-x>>-
cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5500_csc-ssm>>-
cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5505>>-
cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5506-x>>-
cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5506h-x>>-
cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5506w-x>>-
cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5508-x>>-
cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5510>>-
cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5512-x>>-
cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5515-x>>-
cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5516-x>>-
cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5520>>-
cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5525-x>>-
cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5540>>-
cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5545-x>>-
cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5550>>-
cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5555-x>>-
cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5580>>-
cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>asa_5585-x>>-
cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>firewall_services_module>>-
cpe:2.3:h:cisco:firewall_services_module:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_501>>-
cpe:2.3:h:cisco:pix_firewall_501:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_506>>-
cpe:2.3:h:cisco:pix_firewall_506:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_506e>>-
cpe:2.3:h:cisco:pix_firewall_506e:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_515>>-
cpe:2.3:h:cisco:pix_firewall_515:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_515e>>-
cpe:2.3:h:cisco:pix_firewall_515e:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_520>>-
cpe:2.3:h:cisco:pix_firewall_520:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_525>>-
cpe:2.3:h:cisco:pix_firewall_525:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>pix_firewall_535>>-
cpe:2.3:h:cisco:pix_firewall_535:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-77Primarynvd@nist.gov
Evaluator Description

CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://blogs.cisco.com/security/shadow-brokerspsirt@cisco.com
Exploit
Press/Media Coverage
Vendor Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-clipsirt@cisco.com
Vendor Advisory
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516psirt@cisco.com
Vendor Advisory
http://www.securityfocus.com/bid/92520psirt@cisco.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036636psirt@cisco.com
Broken Link
Third Party Advisory
VDB Entry
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zippsirt@cisco.com
Broken Link
Exploit
https://www.exploit-db.com/exploits/40271/psirt@cisco.com
Third Party Advisory
VDB Entry
http://blogs.cisco.com/security/shadow-brokersaf854a3a-2127-422b-91ae-364da2661108
Exploit
Press/Media Coverage
Vendor Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cliaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/92520af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036636af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zipaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Exploit
https://www.exploit-db.com/exploits/40271/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found