Denial of service in Cisco AsyncOS for Cisco Email Security Appliance and Cisco Email Security Appliance - CVE-2016-1486
Published: October 27, 2016 / Updated: April 5, 2018
Vulnerability identifier: #VU1081
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-1486
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco AsyncOS for Cisco Email Security Appliance
Cisco Email Security Appliance
Cisco AsyncOS for Cisco Email Security Appliance
Cisco Email Security Appliance
Detailed vulnerability description
The vulnerability allows a remote unauthenticated user to cause the target system to cease forward messages.
The weakness is due to insufficient validation of input data. By sending an email message with a specially crafted UUencoded file, a remote attacker can trigger a flaw in the Advanced Malware Protection (AMP) function and cause the mail handling process to restart.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
The weakness is due to insufficient validation of input data. By sending an email message with a specially crafted UUencoded file, a remote attacker can trigger a flaw in the Advanced Malware Protection (AMP) function and cause the mail handling process to restart.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
How to mitigate CVE-2016-1486
Update to version 9.7.2-065, 10.0.0-203.