Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.
References
Link | Resource |
---|---|
http://blogs.cisco.com/security/shadow-brokers | Exploit Press/Media Coverage Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cli | Vendor Advisory |
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 | Vendor Advisory |
http://www.securityfocus.com/bid/92520 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036636 | Broken Link Third Party Advisory VDB Entry |
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zip | Broken Link Exploit |
https://www.exploit-db.com/exploits/40271/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2016-08-18 18:59
Updated : 2024-07-02 12:21
NVD link : CVE-2016-6367
Mitre link : CVE-2016-6367
CVE.ORG link : CVE-2016-6367
JSON object : View
Products Affected
cisco
- asa_5520
- asa_5508-x
- pix_firewall_515
- asa_5516-x
- asa_5506w-x
- adaptive_security_appliance_software
- asa_5510
- asa_5540
- asa_5512-x
- asa_5525-x
- asa_5580
- pix_firewall_520
- asa_5505
- asa_5506h-x
- asa_5500-x
- asa_5585-x
- asa_5500
- asa_5506-x
- asa_5500_csc-ssm
- pix_firewall_525
- pix_firewall_501
- asa_5550
- pix_firewall_535
- asa_5515-x
- asa_5555-x
- firewall_services_module
- pix_firewall_515e
- pix_firewall_506e
- pix_firewall_506
- asa_5545-x
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')